@dynamic-labs-wallet/browser 0.0.326 → 0.0.328
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/{index.cjs.js → index.cjs} +148 -40
- package/index.esm.js +148 -40
- package/package.json +4 -4
- package/src/backup/providers/googleDrive.d.ts +25 -0
- package/src/backup/providers/googleDrive.d.ts.map +1 -1
- package/src/backup/utils.d.ts.map +1 -1
- package/src/client.d.ts +15 -5
- package/src/client.d.ts.map +1 -1
- package/src/utils.d.ts.map +1 -1
- /package/{index.cjs.d.ts → index.d.ts} +0 -0
|
@@ -352,6 +352,75 @@ class InvalidPasswordError extends Error {
|
|
|
352
352
|
};
|
|
353
353
|
|
|
354
354
|
const GOOGLE_DRIVE_UPLOAD_API = 'https://www.googleapis.com';
|
|
355
|
+
const NON_RETRYABLE_AUTH_REASONS = new Set([
|
|
356
|
+
'insufficientPermissions',
|
|
357
|
+
'unauthorized',
|
|
358
|
+
'authError'
|
|
359
|
+
]);
|
|
360
|
+
const NON_RETRYABLE_AUTH_DETAIL_REASONS = new Set([
|
|
361
|
+
'ACCESS_TOKEN_SCOPE_INSUFFICIENT',
|
|
362
|
+
'ACCESS_TOKEN_EXPIRED',
|
|
363
|
+
'CREDENTIALS_MISSING'
|
|
364
|
+
]);
|
|
365
|
+
const RATE_LIMIT_REASONS = new Set([
|
|
366
|
+
'rateLimitExceeded',
|
|
367
|
+
'userRateLimitExceeded',
|
|
368
|
+
'dailyLimitExceeded'
|
|
369
|
+
]);
|
|
370
|
+
const NETWORK_ERROR = {
|
|
371
|
+
message: 'Could not reach Google Drive. Please check your internet connection and try again.',
|
|
372
|
+
isRetryable: true
|
|
373
|
+
};
|
|
374
|
+
/**
|
|
375
|
+
* Maps a Google Drive API error to an actionable user-facing message and a retry hint.
|
|
376
|
+
* The retry hint is consumed by retryPromise to short-circuit on non-transient failures.
|
|
377
|
+
*/ const mapGoogleDriveUploadError = (httpStatus, body)=>{
|
|
378
|
+
var _error_errors_, _error_errors, _error_details_, _error_details;
|
|
379
|
+
const error = body == null ? void 0 : body.error;
|
|
380
|
+
const reason = error == null ? void 0 : (_error_errors = error.errors) == null ? void 0 : (_error_errors_ = _error_errors[0]) == null ? void 0 : _error_errors_.reason;
|
|
381
|
+
const detailReason = error == null ? void 0 : (_error_details = error.details) == null ? void 0 : (_error_details_ = _error_details[0]) == null ? void 0 : _error_details_.reason;
|
|
382
|
+
if (httpStatus === 401 || reason && NON_RETRYABLE_AUTH_REASONS.has(reason) || detailReason && NON_RETRYABLE_AUTH_DETAIL_REASONS.has(detailReason)) {
|
|
383
|
+
return {
|
|
384
|
+
message: 'Google Drive access denied: missing or insufficient permissions. Make sure the app is requesting Drive permission and that you allowed it during sign-in, then try again.',
|
|
385
|
+
isRetryable: false
|
|
386
|
+
};
|
|
387
|
+
}
|
|
388
|
+
if (reason === 'storageQuotaExceeded') {
|
|
389
|
+
return {
|
|
390
|
+
message: 'Google Drive storage is full. Free up space in your Google Drive and try again.',
|
|
391
|
+
isRetryable: false
|
|
392
|
+
};
|
|
393
|
+
}
|
|
394
|
+
if (httpStatus === 429 || reason && RATE_LIMIT_REASONS.has(reason)) {
|
|
395
|
+
return {
|
|
396
|
+
message: 'Google Drive is temporarily rate-limited. Please try again in a few moments.',
|
|
397
|
+
isRetryable: true
|
|
398
|
+
};
|
|
399
|
+
}
|
|
400
|
+
if (httpStatus >= 500 && httpStatus < 600) {
|
|
401
|
+
return {
|
|
402
|
+
message: 'Google Drive is temporarily unavailable. Please try again shortly.',
|
|
403
|
+
isRetryable: true
|
|
404
|
+
};
|
|
405
|
+
}
|
|
406
|
+
const detail = reason != null ? reason : error == null ? void 0 : error.status;
|
|
407
|
+
return {
|
|
408
|
+
message: detail ? `Google Drive upload failed (HTTP ${httpStatus}: ${detail}).` : `Google Drive upload failed (HTTP ${httpStatus}).`,
|
|
409
|
+
isRetryable: false
|
|
410
|
+
};
|
|
411
|
+
};
|
|
412
|
+
const parseGoogleDriveErrorBody = async (response)=>{
|
|
413
|
+
try {
|
|
414
|
+
return await response.json();
|
|
415
|
+
} catch (e) {
|
|
416
|
+
return null;
|
|
417
|
+
}
|
|
418
|
+
};
|
|
419
|
+
const createGoogleDriveError = (mapped)=>{
|
|
420
|
+
const error = new Error(mapped.message);
|
|
421
|
+
error.isRetryable = mapped.isRetryable;
|
|
422
|
+
return error;
|
|
423
|
+
};
|
|
355
424
|
const uploadFileToGoogleDriveAppStorage = async ({ accessToken, fileName, jsonData })=>{
|
|
356
425
|
return uploadFileToGoogleDrive({
|
|
357
426
|
accessToken,
|
|
@@ -416,9 +485,12 @@ const uploadFileToGoogleDrive = async ({ accessToken, fileName, jsonData, parent
|
|
|
416
485
|
Authorization: `Bearer ${accessToken}`
|
|
417
486
|
},
|
|
418
487
|
body: form
|
|
488
|
+
}).catch(()=>{
|
|
489
|
+
throw createGoogleDriveError(NETWORK_ERROR);
|
|
419
490
|
});
|
|
420
491
|
if (!response.ok) {
|
|
421
|
-
|
|
492
|
+
const body = await parseGoogleDriveErrorBody(response);
|
|
493
|
+
throw createGoogleDriveError(mapGoogleDriveUploadError(response.status, body));
|
|
422
494
|
}
|
|
423
495
|
const result = await response.json();
|
|
424
496
|
const fileId = result.id;
|
|
@@ -600,11 +672,11 @@ const logRetrySuccess = (operationName, attempts, logContext)=>{
|
|
|
600
672
|
attemptsTaken: attempts + 1
|
|
601
673
|
}));
|
|
602
674
|
};
|
|
603
|
-
const logRetryFailure = (operationName, attempts, maxAttempts, errorContext, logContext)=>{
|
|
675
|
+
const logRetryFailure = (operationName, attempts, maxAttempts, errorContext, logContext, isNonRetryable = false)=>{
|
|
604
676
|
core.Logger.warn(`Failed to execute ${operationName} on attempt ${attempts}/${maxAttempts}`, _extends({}, logContext, errorContext, {
|
|
605
677
|
attempt: attempts,
|
|
606
678
|
maxAttempts,
|
|
607
|
-
willRetry: attempts < maxAttempts
|
|
679
|
+
willRetry: !isNonRetryable && attempts < maxAttempts
|
|
608
680
|
}));
|
|
609
681
|
};
|
|
610
682
|
const logRetryExhausted = (operationName, maxAttempts, errorContext, logContext)=>{
|
|
@@ -631,7 +703,12 @@ const logRetryExhausted = (operationName, maxAttempts, errorContext, logContext)
|
|
|
631
703
|
} catch (error) {
|
|
632
704
|
attempts++;
|
|
633
705
|
const errorContext = buildErrorContext(error);
|
|
634
|
-
|
|
706
|
+
const isNonRetryable = (error == null ? void 0 : error.isRetryable) === false;
|
|
707
|
+
logRetryFailure(operationName, attempts, maxAttempts, errorContext, logContext, isNonRetryable);
|
|
708
|
+
if (isNonRetryable) {
|
|
709
|
+
core.Logger.debug(`Skipping retry for ${operationName}: error marked non-retryable`, _extends({}, logContext, errorContext));
|
|
710
|
+
throw error;
|
|
711
|
+
}
|
|
635
712
|
if (attempts === maxAttempts) {
|
|
636
713
|
logRetryExhausted(operationName, maxAttempts, errorContext, logContext);
|
|
637
714
|
throw error;
|
|
@@ -1153,18 +1230,24 @@ const initializeCloudKit = async (config, signInButtonId, onSignInRequired, onSi
|
|
|
1153
1230
|
};
|
|
1154
1231
|
/**
|
|
1155
1232
|
* Processes a single upload result and logs appropriately
|
|
1156
|
-
* @returns
|
|
1233
|
+
* @returns Failure details if rejected, undefined if successful
|
|
1157
1234
|
*/ const processUploadResult = (result, locationName, logContext, logger)=>{
|
|
1235
|
+
var _result_reason;
|
|
1158
1236
|
if (result.status === 'fulfilled') {
|
|
1159
1237
|
logger.info(`[DynamicWaasWalletClient] Successfully uploaded keyshares to ${locationName}`, logContext);
|
|
1160
1238
|
return undefined;
|
|
1161
1239
|
}
|
|
1162
1240
|
const { message, stack } = getErrorDetails(result.reason);
|
|
1241
|
+
const isRetryable = ((_result_reason = result.reason) == null ? void 0 : _result_reason.isRetryable) !== false;
|
|
1163
1242
|
logger.error(`[DynamicWaasWalletClient] Failed to upload keyshares to ${locationName}`, _extends({}, logContext, {
|
|
1164
1243
|
error: message,
|
|
1165
1244
|
errorStack: stack
|
|
1166
1245
|
}));
|
|
1167
|
-
return
|
|
1246
|
+
return {
|
|
1247
|
+
locationName,
|
|
1248
|
+
message,
|
|
1249
|
+
isRetryable
|
|
1250
|
+
};
|
|
1168
1251
|
};
|
|
1169
1252
|
/**
|
|
1170
1253
|
* Uploads a backup to Google Drive App
|
|
@@ -1204,16 +1287,27 @@ const initializeCloudKit = async (config, signInButtonId, onSignInRequired, onSi
|
|
|
1204
1287
|
})
|
|
1205
1288
|
];
|
|
1206
1289
|
const results = await Promise.allSettled(uploadPromises);
|
|
1207
|
-
const
|
|
1290
|
+
const failures = [
|
|
1208
1291
|
processUploadResult(results[0], 'Google Drive App Storage', logContext, logger),
|
|
1209
1292
|
processUploadResult(results[1], 'Google Drive Personal', logContext, logger)
|
|
1210
|
-
].filter((
|
|
1211
|
-
if (
|
|
1293
|
+
].filter((failure)=>failure !== undefined);
|
|
1294
|
+
if (failures.length > 0) {
|
|
1212
1295
|
logger.error('[DynamicWaasWalletClient] Google Drive backup failed', _extends({}, logContext, {
|
|
1213
|
-
errorCount:
|
|
1214
|
-
errors
|
|
1296
|
+
errorCount: failures.length,
|
|
1297
|
+
errors: failures.map((f)=>`Failed to backup keyshares to ${f.locationName}: ${f.message}`)
|
|
1215
1298
|
}));
|
|
1216
|
-
|
|
1299
|
+
// Both upload destinations (appDataFolder + personal) commonly fail with
|
|
1300
|
+
// the same underlying error (e.g., missing OAuth scope). When all failures
|
|
1301
|
+
// share one message, surface it once without per-location wrapping;
|
|
1302
|
+
// otherwise keep a short "Location: message" prefix per failure so the
|
|
1303
|
+
// user can see what differed.
|
|
1304
|
+
const uniqueMessages = [
|
|
1305
|
+
...new Set(failures.map((f)=>f.message))
|
|
1306
|
+
];
|
|
1307
|
+
const finalMessage = uniqueMessages.length === 1 ? uniqueMessages[0] : failures.map((f)=>`${f.locationName}: ${f.message}`).join(' | ');
|
|
1308
|
+
const aggregatedError = new Error(finalMessage);
|
|
1309
|
+
aggregatedError.isRetryable = failures.every((f)=>f.isRetryable);
|
|
1310
|
+
throw aggregatedError;
|
|
1217
1311
|
}
|
|
1218
1312
|
logger.info('[DynamicWaasWalletClient] Google Drive backup completed successfully', logContext);
|
|
1219
1313
|
};
|
|
@@ -2995,7 +3089,7 @@ class DynamicWalletClient {
|
|
|
2995
3089
|
existingClientKeyShares
|
|
2996
3090
|
};
|
|
2997
3091
|
}
|
|
2998
|
-
async reshare({ chainName, accountAddress, oldThresholdSignatureScheme, newThresholdSignatureScheme, password = undefined, signedSessionId, cloudProviders = [], delegateToProjectEnvironment = false, mfaToken, elevatedAccessToken, revokeDelegation = false }) {
|
|
3092
|
+
async reshare({ chainName, accountAddress, oldThresholdSignatureScheme, newThresholdSignatureScheme, password = undefined, signedSessionId, cloudProviders = [], delegateToProjectEnvironment = false, mfaToken, elevatedAccessToken, revokeDelegation = false, googleDriveAccessToken }) {
|
|
2999
3093
|
return WalletQueueManager.queueHeavyOperation(accountAddress, core.WalletOperation.RESHARE, ()=>this.internalReshare({
|
|
3000
3094
|
chainName,
|
|
3001
3095
|
accountAddress,
|
|
@@ -3007,10 +3101,11 @@ class DynamicWalletClient {
|
|
|
3007
3101
|
delegateToProjectEnvironment,
|
|
3008
3102
|
mfaToken,
|
|
3009
3103
|
elevatedAccessToken,
|
|
3010
|
-
revokeDelegation
|
|
3104
|
+
revokeDelegation,
|
|
3105
|
+
googleDriveAccessToken
|
|
3011
3106
|
}));
|
|
3012
3107
|
}
|
|
3013
|
-
async internalReshare({ chainName, accountAddress, oldThresholdSignatureScheme, newThresholdSignatureScheme, password = undefined, signedSessionId, cloudProviders = [], delegateToProjectEnvironment = false, mfaToken, elevatedAccessToken, revokeDelegation = false, hasAttemptedKeyShareRecovery = false }) {
|
|
3108
|
+
async internalReshare({ chainName, accountAddress, oldThresholdSignatureScheme, newThresholdSignatureScheme, password = undefined, signedSessionId, cloudProviders = [], delegateToProjectEnvironment = false, mfaToken, elevatedAccessToken, revokeDelegation = false, hasAttemptedKeyShareRecovery = false, googleDriveAccessToken }) {
|
|
3014
3109
|
const dynamicRequestId = uuid.v4();
|
|
3015
3110
|
// Password validation - wrapped in try-catch for consistent error handling
|
|
3016
3111
|
// This path should NOT wipe key shares on failure (shares remain valid)
|
|
@@ -3190,7 +3285,8 @@ class DynamicWalletClient {
|
|
|
3190
3285
|
mfaToken,
|
|
3191
3286
|
elevatedAccessToken,
|
|
3192
3287
|
revokeDelegation,
|
|
3193
|
-
hasAttemptedKeyShareRecovery: true
|
|
3288
|
+
hasAttemptedKeyShareRecovery: true,
|
|
3289
|
+
googleDriveAccessToken
|
|
3194
3290
|
});
|
|
3195
3291
|
}
|
|
3196
3292
|
throw reshareError;
|
|
@@ -3240,7 +3336,8 @@ class DynamicWalletClient {
|
|
|
3240
3336
|
accountAddress,
|
|
3241
3337
|
password,
|
|
3242
3338
|
signedSessionId,
|
|
3243
|
-
distribution
|
|
3339
|
+
distribution,
|
|
3340
|
+
googleDriveAccessToken
|
|
3244
3341
|
});
|
|
3245
3342
|
// Store client key shares to storage (localStorage or secureStorage)
|
|
3246
3343
|
// only after backup succeeds.
|
|
@@ -3745,7 +3842,7 @@ class DynamicWalletClient {
|
|
|
3745
3842
|
]);
|
|
3746
3843
|
}));
|
|
3747
3844
|
}
|
|
3748
|
-
async backupToCloudProvider({ provider, shares, accountAddress, password, chainName, bitcoinConfig, isPasswordEncrypted, preEncryptedShares }) {
|
|
3845
|
+
async backupToCloudProvider({ provider, shares, accountAddress, password, chainName, bitcoinConfig, isPasswordEncrypted, preEncryptedShares, googleDriveAccessToken }) {
|
|
3749
3846
|
const encryptedCloudShares = preEncryptedShares != null ? preEncryptedShares : await Promise.all(shares.map((keyShare)=>this.encryptKeyShare({
|
|
3750
3847
|
keyShare,
|
|
3751
3848
|
password
|
|
@@ -3753,7 +3850,8 @@ class DynamicWalletClient {
|
|
|
3753
3850
|
await this.uploadToCloudProvider({
|
|
3754
3851
|
provider,
|
|
3755
3852
|
accountAddress,
|
|
3756
|
-
encryptedKeyShares: encryptedCloudShares
|
|
3853
|
+
encryptedKeyShares: encryptedCloudShares,
|
|
3854
|
+
googleDriveAccessToken
|
|
3757
3855
|
});
|
|
3758
3856
|
const keygenId = await this.getExportId({
|
|
3759
3857
|
chainName,
|
|
@@ -3810,7 +3908,7 @@ class DynamicWalletClient {
|
|
|
3810
3908
|
}
|
|
3811
3909
|
return location;
|
|
3812
3910
|
}
|
|
3813
|
-
async backupSharesWithDistribution({ accountAddress, password, signedSessionId, distribution, preserveDelegatedLocation = false, passwordUpdateBatchId }) {
|
|
3911
|
+
async backupSharesWithDistribution({ accountAddress, password, signedSessionId, distribution, preserveDelegatedLocation = false, passwordUpdateBatchId, googleDriveAccessToken }) {
|
|
3814
3912
|
const dynamicRequestId = uuid.v4();
|
|
3815
3913
|
// Get wallet data early for logging context (also used in catch block)
|
|
3816
3914
|
const walletData = this.getWalletFromMap(accountAddress);
|
|
@@ -3903,7 +4001,8 @@ class DynamicWalletClient {
|
|
|
3903
4001
|
chainName: walletData.chainName,
|
|
3904
4002
|
bitcoinConfig,
|
|
3905
4003
|
isPasswordEncrypted,
|
|
3906
|
-
preEncryptedShares: encrypted
|
|
4004
|
+
preEncryptedShares: encrypted,
|
|
4005
|
+
googleDriveAccessToken
|
|
3907
4006
|
}));
|
|
3908
4007
|
}
|
|
3909
4008
|
if (distribution.delegatedShare) {
|
|
@@ -4024,7 +4123,7 @@ class DynamicWalletClient {
|
|
|
4024
4123
|
* @param params.signedSessionId - Optional signed session ID for authentication
|
|
4025
4124
|
* @param params.backupToGoogleDrive - Whether to backup to Google Drive (defaults to false)
|
|
4026
4125
|
* @returns Promise with backup metadata including share locations and IDs
|
|
4027
|
-
*/ async storeEncryptedBackupByWallet({ accountAddress, clientKeyShares = undefined, password = undefined, signedSessionId, cloudProviders = [], delegatedKeyshare = undefined, passwordUpdateBatchId }) {
|
|
4126
|
+
*/ async storeEncryptedBackupByWallet({ accountAddress, clientKeyShares = undefined, password = undefined, signedSessionId, cloudProviders = [], delegatedKeyshare = undefined, passwordUpdateBatchId, googleDriveAccessToken }) {
|
|
4028
4127
|
var _this_getWalletFromMap, _backupData_locationsWithKeyShares, _backupData_locationsWithKeyShares1;
|
|
4029
4128
|
const keySharesToBackup = clientKeyShares != null ? clientKeyShares : await this.getClientKeySharesFromStorage({
|
|
4030
4129
|
accountAddress
|
|
@@ -4081,7 +4180,8 @@ class DynamicWalletClient {
|
|
|
4081
4180
|
signedSessionId,
|
|
4082
4181
|
distribution,
|
|
4083
4182
|
preserveDelegatedLocation,
|
|
4084
|
-
passwordUpdateBatchId
|
|
4183
|
+
passwordUpdateBatchId,
|
|
4184
|
+
googleDriveAccessToken
|
|
4085
4185
|
});
|
|
4086
4186
|
var _backupData_locationsWithKeyShares_map, _backupData_locationsWithKeyShares_map1;
|
|
4087
4187
|
return _extends({}, backupData, {
|
|
@@ -4329,6 +4429,12 @@ class DynamicWalletClient {
|
|
|
4329
4429
|
throw error;
|
|
4330
4430
|
}
|
|
4331
4431
|
}
|
|
4432
|
+
async fetchGoogleDriveAccessToken(accountAddress) {
|
|
4433
|
+
const oauthAccountId = await this.getGoogleOauthAccountIdOrThrow(accountAddress);
|
|
4434
|
+
return this.apiClient.getAccessToken({
|
|
4435
|
+
oauthAccountId
|
|
4436
|
+
});
|
|
4437
|
+
}
|
|
4332
4438
|
/**
|
|
4333
4439
|
* Helper function to determine keyshare recovery strategy for dynamic shares.
|
|
4334
4440
|
* For REFRESH operations, retrieves enough shares to meet the client threshold.
|
|
@@ -4479,7 +4585,7 @@ class DynamicWalletClient {
|
|
|
4479
4585
|
* Internal helper method that handles the complete flow for ensuring wallet key shares are backed up to a cloud provider.
|
|
4480
4586
|
* - For 2-of-2 wallets: Automatically reshares to 2-of-3 threshold, then distributes shares (1 to backend, 1 to cloud)
|
|
4481
4587
|
* - For 2-of-3 wallets: Call storeEncryptedBackupByWallet to backup for backend and cloud
|
|
4482
|
-
*/ async backupKeySharesToCloudProvider({ accountAddress, password, signedSessionId, backupLocation }) {
|
|
4588
|
+
*/ async backupKeySharesToCloudProvider({ accountAddress, password, signedSessionId, backupLocation, googleDriveAccessToken }) {
|
|
4483
4589
|
try {
|
|
4484
4590
|
await this.getWallet({
|
|
4485
4591
|
accountAddress,
|
|
@@ -4500,7 +4606,8 @@ class DynamicWalletClient {
|
|
|
4500
4606
|
signedSessionId,
|
|
4501
4607
|
cloudProviders: [
|
|
4502
4608
|
backupLocation
|
|
4503
|
-
]
|
|
4609
|
+
],
|
|
4610
|
+
googleDriveAccessToken
|
|
4504
4611
|
});
|
|
4505
4612
|
} else {
|
|
4506
4613
|
await this.storeEncryptedBackupByWallet({
|
|
@@ -4509,7 +4616,8 @@ class DynamicWalletClient {
|
|
|
4509
4616
|
signedSessionId,
|
|
4510
4617
|
cloudProviders: [
|
|
4511
4618
|
backupLocation
|
|
4512
|
-
]
|
|
4619
|
+
],
|
|
4620
|
+
googleDriveAccessToken
|
|
4513
4621
|
});
|
|
4514
4622
|
}
|
|
4515
4623
|
} catch (error) {
|
|
@@ -4533,14 +4641,17 @@ class DynamicWalletClient {
|
|
|
4533
4641
|
* @param params.accountAddress - The wallet account address to backup
|
|
4534
4642
|
* @param params.password - Optional password for encryption (uses environment ID if not provided)
|
|
4535
4643
|
* @param params.signedSessionId - Optional signed session ID for authentication
|
|
4536
|
-
|
|
4644
|
+
* @param params.googleDriveAccessToken - Optional Google OAuth access token. When provided, the SDK uses it directly
|
|
4645
|
+
* instead of looking up the user's linked Google account and exchanging it for a token via the Dynamic backend.
|
|
4646
|
+
*/ async backupKeySharesToGoogleDrive({ accountAddress, password, signedSessionId, googleDriveAccessToken }) {
|
|
4537
4647
|
const updatedBackupServiceAuthToken = await this.apiClient.getBackupRelayToken({});
|
|
4538
4648
|
this.apiClient.syncBackupServiceAuthToken(updatedBackupServiceAuthToken);
|
|
4539
4649
|
return this.backupKeySharesToCloudProvider({
|
|
4540
4650
|
accountAddress,
|
|
4541
4651
|
password,
|
|
4542
4652
|
signedSessionId,
|
|
4543
|
-
backupLocation: core.BackupLocation.GOOGLE_DRIVE
|
|
4653
|
+
backupLocation: core.BackupLocation.GOOGLE_DRIVE,
|
|
4654
|
+
googleDriveAccessToken
|
|
4544
4655
|
});
|
|
4545
4656
|
}
|
|
4546
4657
|
/**
|
|
@@ -4565,13 +4676,15 @@ class DynamicWalletClient {
|
|
|
4565
4676
|
* @param provider - The cloud backup provider (GOOGLE_DRIVE, ICLOUD, etc.)
|
|
4566
4677
|
* @param accountAddress - Wallet account address
|
|
4567
4678
|
* @param encryptedKeyShares - Already encrypted key shares to upload
|
|
4679
|
+
* @param googleDriveAccessToken - Optional Google OAuth access token used when provider is GOOGLE_DRIVE
|
|
4568
4680
|
* @returns Promise<void>
|
|
4569
|
-
*/ async uploadToCloudProvider({ provider, accountAddress, encryptedKeyShares }) {
|
|
4681
|
+
*/ async uploadToCloudProvider({ provider, accountAddress, encryptedKeyShares, googleDriveAccessToken }) {
|
|
4570
4682
|
switch(provider){
|
|
4571
4683
|
case core.BackupLocation.GOOGLE_DRIVE:
|
|
4572
4684
|
return this.uploadKeySharesToGoogleDrive({
|
|
4573
4685
|
accountAddress,
|
|
4574
|
-
encryptedKeyShares
|
|
4686
|
+
encryptedKeyShares,
|
|
4687
|
+
googleDriveAccessToken
|
|
4575
4688
|
});
|
|
4576
4689
|
case core.BackupLocation.ICLOUD:
|
|
4577
4690
|
return this.uploadKeySharesToICloud({
|
|
@@ -4592,16 +4705,14 @@ class DynamicWalletClient {
|
|
|
4592
4705
|
* @param params.accountAddress - The wallet account address
|
|
4593
4706
|
* @param params.password - Optional password for encryption (uses environment ID if not provided)
|
|
4594
4707
|
* @param params.encryptedKeyShares - The specific key shares to upload to Google Drive
|
|
4708
|
+
* @param params.googleDriveAccessToken - Optional Google OAuth access token. When provided, skips the on-the-fly token fetch.
|
|
4595
4709
|
* @returns Promise<string[]> - Array of Google Drive key share IDs that were uploaded
|
|
4596
|
-
*/ async uploadKeySharesToGoogleDrive({ accountAddress, encryptedKeyShares }) {
|
|
4710
|
+
*/ async uploadKeySharesToGoogleDrive({ accountAddress, encryptedKeyShares, googleDriveAccessToken }) {
|
|
4597
4711
|
try {
|
|
4598
4712
|
if (encryptedKeyShares.length === 0) {
|
|
4599
4713
|
throw new Error('No key shares found');
|
|
4600
4714
|
}
|
|
4601
|
-
const
|
|
4602
|
-
const accessToken = await this.apiClient.getAccessToken({
|
|
4603
|
-
oauthAccountId
|
|
4604
|
-
});
|
|
4715
|
+
const accessToken = googleDriveAccessToken != null ? googleDriveAccessToken : await this.fetchGoogleDriveAccessToken(accountAddress);
|
|
4605
4716
|
const walletData = this.getWalletFromMap(accountAddress);
|
|
4606
4717
|
const thresholdSignatureScheme = walletData.thresholdSignatureScheme;
|
|
4607
4718
|
const fileName = getClientKeyShareExportFileName({
|
|
@@ -4666,17 +4777,14 @@ class DynamicWalletClient {
|
|
|
4666
4777
|
throw error;
|
|
4667
4778
|
}
|
|
4668
4779
|
}
|
|
4669
|
-
async exportClientKeysharesFromGoogleDrive({ accountAddress, password, signedSessionId }) {
|
|
4780
|
+
async exportClientKeysharesFromGoogleDrive({ accountAddress, password, signedSessionId, googleDriveAccessToken }) {
|
|
4670
4781
|
try {
|
|
4671
4782
|
var _this_getWalletFromMap;
|
|
4672
4783
|
await this.getWallet({
|
|
4673
4784
|
accountAddress,
|
|
4674
4785
|
signedSessionId
|
|
4675
4786
|
});
|
|
4676
|
-
const
|
|
4677
|
-
const accessToken = await this.apiClient.getAccessToken({
|
|
4678
|
-
oauthAccountId
|
|
4679
|
-
});
|
|
4787
|
+
const accessToken = googleDriveAccessToken != null ? googleDriveAccessToken : await this.fetchGoogleDriveAccessToken(accountAddress);
|
|
4680
4788
|
const thresholdSignatureScheme = this.getWalletFromMap(accountAddress).thresholdSignatureScheme;
|
|
4681
4789
|
const backupFileName = getClientKeyShareExportFileName({
|
|
4682
4790
|
thresholdSignatureScheme,
|
package/index.esm.js
CHANGED
|
@@ -353,6 +353,75 @@ class InvalidPasswordError extends Error {
|
|
|
353
353
|
};
|
|
354
354
|
|
|
355
355
|
const GOOGLE_DRIVE_UPLOAD_API = 'https://www.googleapis.com';
|
|
356
|
+
const NON_RETRYABLE_AUTH_REASONS = new Set([
|
|
357
|
+
'insufficientPermissions',
|
|
358
|
+
'unauthorized',
|
|
359
|
+
'authError'
|
|
360
|
+
]);
|
|
361
|
+
const NON_RETRYABLE_AUTH_DETAIL_REASONS = new Set([
|
|
362
|
+
'ACCESS_TOKEN_SCOPE_INSUFFICIENT',
|
|
363
|
+
'ACCESS_TOKEN_EXPIRED',
|
|
364
|
+
'CREDENTIALS_MISSING'
|
|
365
|
+
]);
|
|
366
|
+
const RATE_LIMIT_REASONS = new Set([
|
|
367
|
+
'rateLimitExceeded',
|
|
368
|
+
'userRateLimitExceeded',
|
|
369
|
+
'dailyLimitExceeded'
|
|
370
|
+
]);
|
|
371
|
+
const NETWORK_ERROR = {
|
|
372
|
+
message: 'Could not reach Google Drive. Please check your internet connection and try again.',
|
|
373
|
+
isRetryable: true
|
|
374
|
+
};
|
|
375
|
+
/**
|
|
376
|
+
* Maps a Google Drive API error to an actionable user-facing message and a retry hint.
|
|
377
|
+
* The retry hint is consumed by retryPromise to short-circuit on non-transient failures.
|
|
378
|
+
*/ const mapGoogleDriveUploadError = (httpStatus, body)=>{
|
|
379
|
+
var _error_errors_, _error_errors, _error_details_, _error_details;
|
|
380
|
+
const error = body == null ? void 0 : body.error;
|
|
381
|
+
const reason = error == null ? void 0 : (_error_errors = error.errors) == null ? void 0 : (_error_errors_ = _error_errors[0]) == null ? void 0 : _error_errors_.reason;
|
|
382
|
+
const detailReason = error == null ? void 0 : (_error_details = error.details) == null ? void 0 : (_error_details_ = _error_details[0]) == null ? void 0 : _error_details_.reason;
|
|
383
|
+
if (httpStatus === 401 || reason && NON_RETRYABLE_AUTH_REASONS.has(reason) || detailReason && NON_RETRYABLE_AUTH_DETAIL_REASONS.has(detailReason)) {
|
|
384
|
+
return {
|
|
385
|
+
message: 'Google Drive access denied: missing or insufficient permissions. Make sure the app is requesting Drive permission and that you allowed it during sign-in, then try again.',
|
|
386
|
+
isRetryable: false
|
|
387
|
+
};
|
|
388
|
+
}
|
|
389
|
+
if (reason === 'storageQuotaExceeded') {
|
|
390
|
+
return {
|
|
391
|
+
message: 'Google Drive storage is full. Free up space in your Google Drive and try again.',
|
|
392
|
+
isRetryable: false
|
|
393
|
+
};
|
|
394
|
+
}
|
|
395
|
+
if (httpStatus === 429 || reason && RATE_LIMIT_REASONS.has(reason)) {
|
|
396
|
+
return {
|
|
397
|
+
message: 'Google Drive is temporarily rate-limited. Please try again in a few moments.',
|
|
398
|
+
isRetryable: true
|
|
399
|
+
};
|
|
400
|
+
}
|
|
401
|
+
if (httpStatus >= 500 && httpStatus < 600) {
|
|
402
|
+
return {
|
|
403
|
+
message: 'Google Drive is temporarily unavailable. Please try again shortly.',
|
|
404
|
+
isRetryable: true
|
|
405
|
+
};
|
|
406
|
+
}
|
|
407
|
+
const detail = reason != null ? reason : error == null ? void 0 : error.status;
|
|
408
|
+
return {
|
|
409
|
+
message: detail ? `Google Drive upload failed (HTTP ${httpStatus}: ${detail}).` : `Google Drive upload failed (HTTP ${httpStatus}).`,
|
|
410
|
+
isRetryable: false
|
|
411
|
+
};
|
|
412
|
+
};
|
|
413
|
+
const parseGoogleDriveErrorBody = async (response)=>{
|
|
414
|
+
try {
|
|
415
|
+
return await response.json();
|
|
416
|
+
} catch (e) {
|
|
417
|
+
return null;
|
|
418
|
+
}
|
|
419
|
+
};
|
|
420
|
+
const createGoogleDriveError = (mapped)=>{
|
|
421
|
+
const error = new Error(mapped.message);
|
|
422
|
+
error.isRetryable = mapped.isRetryable;
|
|
423
|
+
return error;
|
|
424
|
+
};
|
|
356
425
|
const uploadFileToGoogleDriveAppStorage = async ({ accessToken, fileName, jsonData })=>{
|
|
357
426
|
return uploadFileToGoogleDrive({
|
|
358
427
|
accessToken,
|
|
@@ -417,9 +486,12 @@ const uploadFileToGoogleDrive = async ({ accessToken, fileName, jsonData, parent
|
|
|
417
486
|
Authorization: `Bearer ${accessToken}`
|
|
418
487
|
},
|
|
419
488
|
body: form
|
|
489
|
+
}).catch(()=>{
|
|
490
|
+
throw createGoogleDriveError(NETWORK_ERROR);
|
|
420
491
|
});
|
|
421
492
|
if (!response.ok) {
|
|
422
|
-
|
|
493
|
+
const body = await parseGoogleDriveErrorBody(response);
|
|
494
|
+
throw createGoogleDriveError(mapGoogleDriveUploadError(response.status, body));
|
|
423
495
|
}
|
|
424
496
|
const result = await response.json();
|
|
425
497
|
const fileId = result.id;
|
|
@@ -601,11 +673,11 @@ const logRetrySuccess = (operationName, attempts, logContext)=>{
|
|
|
601
673
|
attemptsTaken: attempts + 1
|
|
602
674
|
}));
|
|
603
675
|
};
|
|
604
|
-
const logRetryFailure = (operationName, attempts, maxAttempts, errorContext, logContext)=>{
|
|
676
|
+
const logRetryFailure = (operationName, attempts, maxAttempts, errorContext, logContext, isNonRetryable = false)=>{
|
|
605
677
|
Logger.warn(`Failed to execute ${operationName} on attempt ${attempts}/${maxAttempts}`, _extends({}, logContext, errorContext, {
|
|
606
678
|
attempt: attempts,
|
|
607
679
|
maxAttempts,
|
|
608
|
-
willRetry: attempts < maxAttempts
|
|
680
|
+
willRetry: !isNonRetryable && attempts < maxAttempts
|
|
609
681
|
}));
|
|
610
682
|
};
|
|
611
683
|
const logRetryExhausted = (operationName, maxAttempts, errorContext, logContext)=>{
|
|
@@ -632,7 +704,12 @@ const logRetryExhausted = (operationName, maxAttempts, errorContext, logContext)
|
|
|
632
704
|
} catch (error) {
|
|
633
705
|
attempts++;
|
|
634
706
|
const errorContext = buildErrorContext(error);
|
|
635
|
-
|
|
707
|
+
const isNonRetryable = (error == null ? void 0 : error.isRetryable) === false;
|
|
708
|
+
logRetryFailure(operationName, attempts, maxAttempts, errorContext, logContext, isNonRetryable);
|
|
709
|
+
if (isNonRetryable) {
|
|
710
|
+
Logger.debug(`Skipping retry for ${operationName}: error marked non-retryable`, _extends({}, logContext, errorContext));
|
|
711
|
+
throw error;
|
|
712
|
+
}
|
|
636
713
|
if (attempts === maxAttempts) {
|
|
637
714
|
logRetryExhausted(operationName, maxAttempts, errorContext, logContext);
|
|
638
715
|
throw error;
|
|
@@ -1154,18 +1231,24 @@ const initializeCloudKit = async (config, signInButtonId, onSignInRequired, onSi
|
|
|
1154
1231
|
};
|
|
1155
1232
|
/**
|
|
1156
1233
|
* Processes a single upload result and logs appropriately
|
|
1157
|
-
* @returns
|
|
1234
|
+
* @returns Failure details if rejected, undefined if successful
|
|
1158
1235
|
*/ const processUploadResult = (result, locationName, logContext, logger)=>{
|
|
1236
|
+
var _result_reason;
|
|
1159
1237
|
if (result.status === 'fulfilled') {
|
|
1160
1238
|
logger.info(`[DynamicWaasWalletClient] Successfully uploaded keyshares to ${locationName}`, logContext);
|
|
1161
1239
|
return undefined;
|
|
1162
1240
|
}
|
|
1163
1241
|
const { message, stack } = getErrorDetails(result.reason);
|
|
1242
|
+
const isRetryable = ((_result_reason = result.reason) == null ? void 0 : _result_reason.isRetryable) !== false;
|
|
1164
1243
|
logger.error(`[DynamicWaasWalletClient] Failed to upload keyshares to ${locationName}`, _extends({}, logContext, {
|
|
1165
1244
|
error: message,
|
|
1166
1245
|
errorStack: stack
|
|
1167
1246
|
}));
|
|
1168
|
-
return
|
|
1247
|
+
return {
|
|
1248
|
+
locationName,
|
|
1249
|
+
message,
|
|
1250
|
+
isRetryable
|
|
1251
|
+
};
|
|
1169
1252
|
};
|
|
1170
1253
|
/**
|
|
1171
1254
|
* Uploads a backup to Google Drive App
|
|
@@ -1205,16 +1288,27 @@ const initializeCloudKit = async (config, signInButtonId, onSignInRequired, onSi
|
|
|
1205
1288
|
})
|
|
1206
1289
|
];
|
|
1207
1290
|
const results = await Promise.allSettled(uploadPromises);
|
|
1208
|
-
const
|
|
1291
|
+
const failures = [
|
|
1209
1292
|
processUploadResult(results[0], 'Google Drive App Storage', logContext, logger),
|
|
1210
1293
|
processUploadResult(results[1], 'Google Drive Personal', logContext, logger)
|
|
1211
|
-
].filter((
|
|
1212
|
-
if (
|
|
1294
|
+
].filter((failure)=>failure !== undefined);
|
|
1295
|
+
if (failures.length > 0) {
|
|
1213
1296
|
logger.error('[DynamicWaasWalletClient] Google Drive backup failed', _extends({}, logContext, {
|
|
1214
|
-
errorCount:
|
|
1215
|
-
errors
|
|
1297
|
+
errorCount: failures.length,
|
|
1298
|
+
errors: failures.map((f)=>`Failed to backup keyshares to ${f.locationName}: ${f.message}`)
|
|
1216
1299
|
}));
|
|
1217
|
-
|
|
1300
|
+
// Both upload destinations (appDataFolder + personal) commonly fail with
|
|
1301
|
+
// the same underlying error (e.g., missing OAuth scope). When all failures
|
|
1302
|
+
// share one message, surface it once without per-location wrapping;
|
|
1303
|
+
// otherwise keep a short "Location: message" prefix per failure so the
|
|
1304
|
+
// user can see what differed.
|
|
1305
|
+
const uniqueMessages = [
|
|
1306
|
+
...new Set(failures.map((f)=>f.message))
|
|
1307
|
+
];
|
|
1308
|
+
const finalMessage = uniqueMessages.length === 1 ? uniqueMessages[0] : failures.map((f)=>`${f.locationName}: ${f.message}`).join(' | ');
|
|
1309
|
+
const aggregatedError = new Error(finalMessage);
|
|
1310
|
+
aggregatedError.isRetryable = failures.every((f)=>f.isRetryable);
|
|
1311
|
+
throw aggregatedError;
|
|
1218
1312
|
}
|
|
1219
1313
|
logger.info('[DynamicWaasWalletClient] Google Drive backup completed successfully', logContext);
|
|
1220
1314
|
};
|
|
@@ -2996,7 +3090,7 @@ class DynamicWalletClient {
|
|
|
2996
3090
|
existingClientKeyShares
|
|
2997
3091
|
};
|
|
2998
3092
|
}
|
|
2999
|
-
async reshare({ chainName, accountAddress, oldThresholdSignatureScheme, newThresholdSignatureScheme, password = undefined, signedSessionId, cloudProviders = [], delegateToProjectEnvironment = false, mfaToken, elevatedAccessToken, revokeDelegation = false }) {
|
|
3093
|
+
async reshare({ chainName, accountAddress, oldThresholdSignatureScheme, newThresholdSignatureScheme, password = undefined, signedSessionId, cloudProviders = [], delegateToProjectEnvironment = false, mfaToken, elevatedAccessToken, revokeDelegation = false, googleDriveAccessToken }) {
|
|
3000
3094
|
return WalletQueueManager.queueHeavyOperation(accountAddress, WalletOperation.RESHARE, ()=>this.internalReshare({
|
|
3001
3095
|
chainName,
|
|
3002
3096
|
accountAddress,
|
|
@@ -3008,10 +3102,11 @@ class DynamicWalletClient {
|
|
|
3008
3102
|
delegateToProjectEnvironment,
|
|
3009
3103
|
mfaToken,
|
|
3010
3104
|
elevatedAccessToken,
|
|
3011
|
-
revokeDelegation
|
|
3105
|
+
revokeDelegation,
|
|
3106
|
+
googleDriveAccessToken
|
|
3012
3107
|
}));
|
|
3013
3108
|
}
|
|
3014
|
-
async internalReshare({ chainName, accountAddress, oldThresholdSignatureScheme, newThresholdSignatureScheme, password = undefined, signedSessionId, cloudProviders = [], delegateToProjectEnvironment = false, mfaToken, elevatedAccessToken, revokeDelegation = false, hasAttemptedKeyShareRecovery = false }) {
|
|
3109
|
+
async internalReshare({ chainName, accountAddress, oldThresholdSignatureScheme, newThresholdSignatureScheme, password = undefined, signedSessionId, cloudProviders = [], delegateToProjectEnvironment = false, mfaToken, elevatedAccessToken, revokeDelegation = false, hasAttemptedKeyShareRecovery = false, googleDriveAccessToken }) {
|
|
3015
3110
|
const dynamicRequestId = v4();
|
|
3016
3111
|
// Password validation - wrapped in try-catch for consistent error handling
|
|
3017
3112
|
// This path should NOT wipe key shares on failure (shares remain valid)
|
|
@@ -3191,7 +3286,8 @@ class DynamicWalletClient {
|
|
|
3191
3286
|
mfaToken,
|
|
3192
3287
|
elevatedAccessToken,
|
|
3193
3288
|
revokeDelegation,
|
|
3194
|
-
hasAttemptedKeyShareRecovery: true
|
|
3289
|
+
hasAttemptedKeyShareRecovery: true,
|
|
3290
|
+
googleDriveAccessToken
|
|
3195
3291
|
});
|
|
3196
3292
|
}
|
|
3197
3293
|
throw reshareError;
|
|
@@ -3241,7 +3337,8 @@ class DynamicWalletClient {
|
|
|
3241
3337
|
accountAddress,
|
|
3242
3338
|
password,
|
|
3243
3339
|
signedSessionId,
|
|
3244
|
-
distribution
|
|
3340
|
+
distribution,
|
|
3341
|
+
googleDriveAccessToken
|
|
3245
3342
|
});
|
|
3246
3343
|
// Store client key shares to storage (localStorage or secureStorage)
|
|
3247
3344
|
// only after backup succeeds.
|
|
@@ -3746,7 +3843,7 @@ class DynamicWalletClient {
|
|
|
3746
3843
|
]);
|
|
3747
3844
|
}));
|
|
3748
3845
|
}
|
|
3749
|
-
async backupToCloudProvider({ provider, shares, accountAddress, password, chainName, bitcoinConfig, isPasswordEncrypted, preEncryptedShares }) {
|
|
3846
|
+
async backupToCloudProvider({ provider, shares, accountAddress, password, chainName, bitcoinConfig, isPasswordEncrypted, preEncryptedShares, googleDriveAccessToken }) {
|
|
3750
3847
|
const encryptedCloudShares = preEncryptedShares != null ? preEncryptedShares : await Promise.all(shares.map((keyShare)=>this.encryptKeyShare({
|
|
3751
3848
|
keyShare,
|
|
3752
3849
|
password
|
|
@@ -3754,7 +3851,8 @@ class DynamicWalletClient {
|
|
|
3754
3851
|
await this.uploadToCloudProvider({
|
|
3755
3852
|
provider,
|
|
3756
3853
|
accountAddress,
|
|
3757
|
-
encryptedKeyShares: encryptedCloudShares
|
|
3854
|
+
encryptedKeyShares: encryptedCloudShares,
|
|
3855
|
+
googleDriveAccessToken
|
|
3758
3856
|
});
|
|
3759
3857
|
const keygenId = await this.getExportId({
|
|
3760
3858
|
chainName,
|
|
@@ -3811,7 +3909,7 @@ class DynamicWalletClient {
|
|
|
3811
3909
|
}
|
|
3812
3910
|
return location;
|
|
3813
3911
|
}
|
|
3814
|
-
async backupSharesWithDistribution({ accountAddress, password, signedSessionId, distribution, preserveDelegatedLocation = false, passwordUpdateBatchId }) {
|
|
3912
|
+
async backupSharesWithDistribution({ accountAddress, password, signedSessionId, distribution, preserveDelegatedLocation = false, passwordUpdateBatchId, googleDriveAccessToken }) {
|
|
3815
3913
|
const dynamicRequestId = v4();
|
|
3816
3914
|
// Get wallet data early for logging context (also used in catch block)
|
|
3817
3915
|
const walletData = this.getWalletFromMap(accountAddress);
|
|
@@ -3904,7 +4002,8 @@ class DynamicWalletClient {
|
|
|
3904
4002
|
chainName: walletData.chainName,
|
|
3905
4003
|
bitcoinConfig,
|
|
3906
4004
|
isPasswordEncrypted,
|
|
3907
|
-
preEncryptedShares: encrypted
|
|
4005
|
+
preEncryptedShares: encrypted,
|
|
4006
|
+
googleDriveAccessToken
|
|
3908
4007
|
}));
|
|
3909
4008
|
}
|
|
3910
4009
|
if (distribution.delegatedShare) {
|
|
@@ -4025,7 +4124,7 @@ class DynamicWalletClient {
|
|
|
4025
4124
|
* @param params.signedSessionId - Optional signed session ID for authentication
|
|
4026
4125
|
* @param params.backupToGoogleDrive - Whether to backup to Google Drive (defaults to false)
|
|
4027
4126
|
* @returns Promise with backup metadata including share locations and IDs
|
|
4028
|
-
*/ async storeEncryptedBackupByWallet({ accountAddress, clientKeyShares = undefined, password = undefined, signedSessionId, cloudProviders = [], delegatedKeyshare = undefined, passwordUpdateBatchId }) {
|
|
4127
|
+
*/ async storeEncryptedBackupByWallet({ accountAddress, clientKeyShares = undefined, password = undefined, signedSessionId, cloudProviders = [], delegatedKeyshare = undefined, passwordUpdateBatchId, googleDriveAccessToken }) {
|
|
4029
4128
|
var _this_getWalletFromMap, _backupData_locationsWithKeyShares, _backupData_locationsWithKeyShares1;
|
|
4030
4129
|
const keySharesToBackup = clientKeyShares != null ? clientKeyShares : await this.getClientKeySharesFromStorage({
|
|
4031
4130
|
accountAddress
|
|
@@ -4082,7 +4181,8 @@ class DynamicWalletClient {
|
|
|
4082
4181
|
signedSessionId,
|
|
4083
4182
|
distribution,
|
|
4084
4183
|
preserveDelegatedLocation,
|
|
4085
|
-
passwordUpdateBatchId
|
|
4184
|
+
passwordUpdateBatchId,
|
|
4185
|
+
googleDriveAccessToken
|
|
4086
4186
|
});
|
|
4087
4187
|
var _backupData_locationsWithKeyShares_map, _backupData_locationsWithKeyShares_map1;
|
|
4088
4188
|
return _extends({}, backupData, {
|
|
@@ -4330,6 +4430,12 @@ class DynamicWalletClient {
|
|
|
4330
4430
|
throw error;
|
|
4331
4431
|
}
|
|
4332
4432
|
}
|
|
4433
|
+
async fetchGoogleDriveAccessToken(accountAddress) {
|
|
4434
|
+
const oauthAccountId = await this.getGoogleOauthAccountIdOrThrow(accountAddress);
|
|
4435
|
+
return this.apiClient.getAccessToken({
|
|
4436
|
+
oauthAccountId
|
|
4437
|
+
});
|
|
4438
|
+
}
|
|
4333
4439
|
/**
|
|
4334
4440
|
* Helper function to determine keyshare recovery strategy for dynamic shares.
|
|
4335
4441
|
* For REFRESH operations, retrieves enough shares to meet the client threshold.
|
|
@@ -4480,7 +4586,7 @@ class DynamicWalletClient {
|
|
|
4480
4586
|
* Internal helper method that handles the complete flow for ensuring wallet key shares are backed up to a cloud provider.
|
|
4481
4587
|
* - For 2-of-2 wallets: Automatically reshares to 2-of-3 threshold, then distributes shares (1 to backend, 1 to cloud)
|
|
4482
4588
|
* - For 2-of-3 wallets: Call storeEncryptedBackupByWallet to backup for backend and cloud
|
|
4483
|
-
*/ async backupKeySharesToCloudProvider({ accountAddress, password, signedSessionId, backupLocation }) {
|
|
4589
|
+
*/ async backupKeySharesToCloudProvider({ accountAddress, password, signedSessionId, backupLocation, googleDriveAccessToken }) {
|
|
4484
4590
|
try {
|
|
4485
4591
|
await this.getWallet({
|
|
4486
4592
|
accountAddress,
|
|
@@ -4501,7 +4607,8 @@ class DynamicWalletClient {
|
|
|
4501
4607
|
signedSessionId,
|
|
4502
4608
|
cloudProviders: [
|
|
4503
4609
|
backupLocation
|
|
4504
|
-
]
|
|
4610
|
+
],
|
|
4611
|
+
googleDriveAccessToken
|
|
4505
4612
|
});
|
|
4506
4613
|
} else {
|
|
4507
4614
|
await this.storeEncryptedBackupByWallet({
|
|
@@ -4510,7 +4617,8 @@ class DynamicWalletClient {
|
|
|
4510
4617
|
signedSessionId,
|
|
4511
4618
|
cloudProviders: [
|
|
4512
4619
|
backupLocation
|
|
4513
|
-
]
|
|
4620
|
+
],
|
|
4621
|
+
googleDriveAccessToken
|
|
4514
4622
|
});
|
|
4515
4623
|
}
|
|
4516
4624
|
} catch (error) {
|
|
@@ -4534,14 +4642,17 @@ class DynamicWalletClient {
|
|
|
4534
4642
|
* @param params.accountAddress - The wallet account address to backup
|
|
4535
4643
|
* @param params.password - Optional password for encryption (uses environment ID if not provided)
|
|
4536
4644
|
* @param params.signedSessionId - Optional signed session ID for authentication
|
|
4537
|
-
|
|
4645
|
+
* @param params.googleDriveAccessToken - Optional Google OAuth access token. When provided, the SDK uses it directly
|
|
4646
|
+
* instead of looking up the user's linked Google account and exchanging it for a token via the Dynamic backend.
|
|
4647
|
+
*/ async backupKeySharesToGoogleDrive({ accountAddress, password, signedSessionId, googleDriveAccessToken }) {
|
|
4538
4648
|
const updatedBackupServiceAuthToken = await this.apiClient.getBackupRelayToken({});
|
|
4539
4649
|
this.apiClient.syncBackupServiceAuthToken(updatedBackupServiceAuthToken);
|
|
4540
4650
|
return this.backupKeySharesToCloudProvider({
|
|
4541
4651
|
accountAddress,
|
|
4542
4652
|
password,
|
|
4543
4653
|
signedSessionId,
|
|
4544
|
-
backupLocation: BackupLocation.GOOGLE_DRIVE
|
|
4654
|
+
backupLocation: BackupLocation.GOOGLE_DRIVE,
|
|
4655
|
+
googleDriveAccessToken
|
|
4545
4656
|
});
|
|
4546
4657
|
}
|
|
4547
4658
|
/**
|
|
@@ -4566,13 +4677,15 @@ class DynamicWalletClient {
|
|
|
4566
4677
|
* @param provider - The cloud backup provider (GOOGLE_DRIVE, ICLOUD, etc.)
|
|
4567
4678
|
* @param accountAddress - Wallet account address
|
|
4568
4679
|
* @param encryptedKeyShares - Already encrypted key shares to upload
|
|
4680
|
+
* @param googleDriveAccessToken - Optional Google OAuth access token used when provider is GOOGLE_DRIVE
|
|
4569
4681
|
* @returns Promise<void>
|
|
4570
|
-
*/ async uploadToCloudProvider({ provider, accountAddress, encryptedKeyShares }) {
|
|
4682
|
+
*/ async uploadToCloudProvider({ provider, accountAddress, encryptedKeyShares, googleDriveAccessToken }) {
|
|
4571
4683
|
switch(provider){
|
|
4572
4684
|
case BackupLocation.GOOGLE_DRIVE:
|
|
4573
4685
|
return this.uploadKeySharesToGoogleDrive({
|
|
4574
4686
|
accountAddress,
|
|
4575
|
-
encryptedKeyShares
|
|
4687
|
+
encryptedKeyShares,
|
|
4688
|
+
googleDriveAccessToken
|
|
4576
4689
|
});
|
|
4577
4690
|
case BackupLocation.ICLOUD:
|
|
4578
4691
|
return this.uploadKeySharesToICloud({
|
|
@@ -4593,16 +4706,14 @@ class DynamicWalletClient {
|
|
|
4593
4706
|
* @param params.accountAddress - The wallet account address
|
|
4594
4707
|
* @param params.password - Optional password for encryption (uses environment ID if not provided)
|
|
4595
4708
|
* @param params.encryptedKeyShares - The specific key shares to upload to Google Drive
|
|
4709
|
+
* @param params.googleDriveAccessToken - Optional Google OAuth access token. When provided, skips the on-the-fly token fetch.
|
|
4596
4710
|
* @returns Promise<string[]> - Array of Google Drive key share IDs that were uploaded
|
|
4597
|
-
*/ async uploadKeySharesToGoogleDrive({ accountAddress, encryptedKeyShares }) {
|
|
4711
|
+
*/ async uploadKeySharesToGoogleDrive({ accountAddress, encryptedKeyShares, googleDriveAccessToken }) {
|
|
4598
4712
|
try {
|
|
4599
4713
|
if (encryptedKeyShares.length === 0) {
|
|
4600
4714
|
throw new Error('No key shares found');
|
|
4601
4715
|
}
|
|
4602
|
-
const
|
|
4603
|
-
const accessToken = await this.apiClient.getAccessToken({
|
|
4604
|
-
oauthAccountId
|
|
4605
|
-
});
|
|
4716
|
+
const accessToken = googleDriveAccessToken != null ? googleDriveAccessToken : await this.fetchGoogleDriveAccessToken(accountAddress);
|
|
4606
4717
|
const walletData = this.getWalletFromMap(accountAddress);
|
|
4607
4718
|
const thresholdSignatureScheme = walletData.thresholdSignatureScheme;
|
|
4608
4719
|
const fileName = getClientKeyShareExportFileName({
|
|
@@ -4667,17 +4778,14 @@ class DynamicWalletClient {
|
|
|
4667
4778
|
throw error;
|
|
4668
4779
|
}
|
|
4669
4780
|
}
|
|
4670
|
-
async exportClientKeysharesFromGoogleDrive({ accountAddress, password, signedSessionId }) {
|
|
4781
|
+
async exportClientKeysharesFromGoogleDrive({ accountAddress, password, signedSessionId, googleDriveAccessToken }) {
|
|
4671
4782
|
try {
|
|
4672
4783
|
var _this_getWalletFromMap;
|
|
4673
4784
|
await this.getWallet({
|
|
4674
4785
|
accountAddress,
|
|
4675
4786
|
signedSessionId
|
|
4676
4787
|
});
|
|
4677
|
-
const
|
|
4678
|
-
const accessToken = await this.apiClient.getAccessToken({
|
|
4679
|
-
oauthAccountId
|
|
4680
|
-
});
|
|
4788
|
+
const accessToken = googleDriveAccessToken != null ? googleDriveAccessToken : await this.fetchGoogleDriveAccessToken(accountAddress);
|
|
4681
4789
|
const thresholdSignatureScheme = this.getWalletFromMap(accountAddress).thresholdSignatureScheme;
|
|
4682
4790
|
const backupFileName = getClientKeyShareExportFileName({
|
|
4683
4791
|
thresholdSignatureScheme,
|
package/package.json
CHANGED
|
@@ -1,10 +1,10 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@dynamic-labs-wallet/browser",
|
|
3
|
-
"version": "0.0.
|
|
3
|
+
"version": "0.0.328",
|
|
4
4
|
"license": "Licensed under the Dynamic Labs, Inc. Terms Of Service (https://www.dynamic.xyz/terms-conditions)",
|
|
5
5
|
"type": "module",
|
|
6
6
|
"dependencies": {
|
|
7
|
-
"@dynamic-labs-wallet/core": "0.0.
|
|
7
|
+
"@dynamic-labs-wallet/core": "0.0.328",
|
|
8
8
|
"@dynamic-labs-wallet/forward-mpc-client": "0.7.0",
|
|
9
9
|
"@dynamic-labs/sdk-api-core": "^0.0.900",
|
|
10
10
|
"argon2id": "1.0.1",
|
|
@@ -30,7 +30,7 @@
|
|
|
30
30
|
"build": {}
|
|
31
31
|
}
|
|
32
32
|
},
|
|
33
|
-
"main": "./index.cjs
|
|
33
|
+
"main": "./index.cjs",
|
|
34
34
|
"module": "./index.esm.js",
|
|
35
35
|
"types": "./index.esm.d.ts",
|
|
36
36
|
"exports": {
|
|
@@ -38,7 +38,7 @@
|
|
|
38
38
|
".": {
|
|
39
39
|
"types": "./index.esm.d.ts",
|
|
40
40
|
"import": "./index.esm.js",
|
|
41
|
-
"require": "./index.cjs
|
|
41
|
+
"require": "./index.cjs",
|
|
42
42
|
"default": "./index.esm.js"
|
|
43
43
|
}
|
|
44
44
|
},
|
|
@@ -1,3 +1,27 @@
|
|
|
1
|
+
type GoogleDriveErrorBody = {
|
|
2
|
+
error?: {
|
|
3
|
+
code?: number;
|
|
4
|
+
status?: string;
|
|
5
|
+
message?: string;
|
|
6
|
+
errors?: Array<{
|
|
7
|
+
reason?: string;
|
|
8
|
+
message?: string;
|
|
9
|
+
}>;
|
|
10
|
+
details?: Array<{
|
|
11
|
+
reason?: string;
|
|
12
|
+
'@type'?: string;
|
|
13
|
+
}>;
|
|
14
|
+
};
|
|
15
|
+
};
|
|
16
|
+
type MappedUploadError = {
|
|
17
|
+
message: string;
|
|
18
|
+
isRetryable: boolean;
|
|
19
|
+
};
|
|
20
|
+
/**
|
|
21
|
+
* Maps a Google Drive API error to an actionable user-facing message and a retry hint.
|
|
22
|
+
* The retry hint is consumed by retryPromise to short-circuit on non-transient failures.
|
|
23
|
+
*/
|
|
24
|
+
export declare const mapGoogleDriveUploadError: (httpStatus: number, body: GoogleDriveErrorBody | null) => MappedUploadError;
|
|
1
25
|
export declare const uploadFileToGoogleDriveAppStorage: ({ accessToken, fileName, jsonData, }: {
|
|
2
26
|
accessToken: string;
|
|
3
27
|
fileName: string;
|
|
@@ -16,4 +40,5 @@ export declare const downloadFileFromGoogleDrive: ({ accessToken, fileName, }: {
|
|
|
16
40
|
accessToken: string;
|
|
17
41
|
fileName: string;
|
|
18
42
|
}) => Promise<unknown | null>;
|
|
43
|
+
export {};
|
|
19
44
|
//# sourceMappingURL=googleDrive.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"googleDrive.d.ts","sourceRoot":"","sources":["../../../src/backup/providers/googleDrive.ts"],"names":[],"mappings":"AAWA,eAAO,MAAM,iCAAiC,yCAI3C;IACD,WAAW,EAAE,MAAM,CAAC;IACpB,QAAQ,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,OAAO,CAAC;CACnB,iBAOA,CAAC;AAEF,eAAO,MAAM,+BAA+B,yCAIzC;IACD,WAAW,EAAE,MAAM,CAAC;IACpB,QAAQ,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,OAAO,CAAC;CACnB,iBAOA,CAAC;
|
|
1
|
+
{"version":3,"file":"googleDrive.d.ts","sourceRoot":"","sources":["../../../src/backup/providers/googleDrive.ts"],"names":[],"mappings":"AAWA,KAAK,oBAAoB,GAAG;IAC1B,KAAK,CAAC,EAAE;QACN,IAAI,CAAC,EAAE,MAAM,CAAC;QACd,MAAM,CAAC,EAAE,MAAM,CAAC;QAChB,OAAO,CAAC,EAAE,MAAM,CAAC;QACjB,MAAM,CAAC,EAAE,KAAK,CAAC;YAAE,MAAM,CAAC,EAAE,MAAM,CAAC;YAAC,OAAO,CAAC,EAAE,MAAM,CAAA;SAAE,CAAC,CAAC;QACtD,OAAO,CAAC,EAAE,KAAK,CAAC;YAAE,MAAM,CAAC,EAAE,MAAM,CAAC;YAAC,OAAO,CAAC,EAAE,MAAM,CAAA;SAAE,CAAC,CAAC;KACxD,CAAC;CACH,CAAC;AAEF,KAAK,iBAAiB,GAAG;IAAE,OAAO,EAAE,MAAM,CAAC;IAAC,WAAW,EAAE,OAAO,CAAA;CAAE,CAAC;AAiBnE;;;GAGG;AACH,eAAO,MAAM,yBAAyB,eAAgB,MAAM,QAAQ,oBAAoB,GAAG,IAAI,KAAG,iBA6CjG,CAAC;AAgBF,eAAO,MAAM,iCAAiC,yCAI3C;IACD,WAAW,EAAE,MAAM,CAAC;IACpB,QAAQ,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,OAAO,CAAC;CACnB,iBAOA,CAAC;AAEF,eAAO,MAAM,+BAA+B,yCAIzC;IACD,WAAW,EAAE,MAAM,CAAC;IACpB,QAAQ,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,OAAO,CAAC;CACnB,iBAOA,CAAC;AA0FF,eAAO,MAAM,wBAAwB,+BAGlC;IACD,WAAW,EAAE,MAAM,CAAC;IACpB,QAAQ,EAAE,MAAM,CAAC;CAClB,iBAuBA,CAAC;AAEF,eAAO,MAAM,2BAA2B,+BAGrC;IACD,WAAW,EAAE,MAAM,CAAC;IACpB,QAAQ,EAAE,MAAM,CAAC;CAClB,KAAG,OAAO,CAAC,OAAO,GAAG,IAAI,CA6BzB,CAAC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"utils.d.ts","sourceRoot":"","sources":["../../src/backup/utils.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,2BAA2B,CAAC;
|
|
1
|
+
{"version":3,"file":"utils.d.ts","sourceRoot":"","sources":["../../src/backup/utils.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,2BAA2B,CAAC;AA8CzD;;;;;;;;;;GAUG;AACH,eAAO,MAAM,yBAAyB,uGASnC;IACD,WAAW,EAAE,MAAM,CAAC;IACpB,QAAQ,EAAE,MAAM,CAAC;IACjB,UAAU,EAAE,GAAG,CAAC;IAChB,cAAc,EAAE,MAAM,CAAC;IACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,aAAa,CAAC,EAAE,MAAM,CAAC;IACvB,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,MAAM,EAAE,OAAO,CAAC;CACjB,kBA+DA,CAAC"}
|
package/src/client.d.ts
CHANGED
|
@@ -324,7 +324,7 @@ export declare class DynamicWalletClient {
|
|
|
324
324
|
existingClientKeygenIds: string[];
|
|
325
325
|
existingClientKeyShares: ClientKeyShare[];
|
|
326
326
|
}>;
|
|
327
|
-
reshare({ chainName, accountAddress, oldThresholdSignatureScheme, newThresholdSignatureScheme, password, signedSessionId, cloudProviders, delegateToProjectEnvironment, mfaToken, elevatedAccessToken, revokeDelegation, }: {
|
|
327
|
+
reshare({ chainName, accountAddress, oldThresholdSignatureScheme, newThresholdSignatureScheme, password, signedSessionId, cloudProviders, delegateToProjectEnvironment, mfaToken, elevatedAccessToken, revokeDelegation, googleDriveAccessToken, }: {
|
|
328
328
|
chainName: string;
|
|
329
329
|
accountAddress: string;
|
|
330
330
|
oldThresholdSignatureScheme: ThresholdSignatureScheme;
|
|
@@ -336,6 +336,7 @@ export declare class DynamicWalletClient {
|
|
|
336
336
|
mfaToken?: string;
|
|
337
337
|
elevatedAccessToken?: string;
|
|
338
338
|
revokeDelegation?: boolean;
|
|
339
|
+
googleDriveAccessToken?: string;
|
|
339
340
|
}): Promise<void>;
|
|
340
341
|
private internalReshare;
|
|
341
342
|
private performDelegationOperation;
|
|
@@ -447,13 +448,14 @@ export declare class DynamicWalletClient {
|
|
|
447
448
|
private backupToCloudProvider;
|
|
448
449
|
private publishDelegatedShare;
|
|
449
450
|
private createPreservedDelegatedLocation;
|
|
450
|
-
backupSharesWithDistribution({ accountAddress, password, signedSessionId, distribution, preserveDelegatedLocation, passwordUpdateBatchId, }: {
|
|
451
|
+
backupSharesWithDistribution({ accountAddress, password, signedSessionId, distribution, preserveDelegatedLocation, passwordUpdateBatchId, googleDriveAccessToken, }: {
|
|
451
452
|
accountAddress: string;
|
|
452
453
|
password?: string;
|
|
453
454
|
signedSessionId?: string;
|
|
454
455
|
distribution: ShareDistribution;
|
|
455
456
|
preserveDelegatedLocation?: boolean;
|
|
456
457
|
passwordUpdateBatchId?: string;
|
|
458
|
+
googleDriveAccessToken?: string;
|
|
457
459
|
}): Promise<{
|
|
458
460
|
message: string;
|
|
459
461
|
walletId: string;
|
|
@@ -496,7 +498,7 @@ export declare class DynamicWalletClient {
|
|
|
496
498
|
* @param params.backupToGoogleDrive - Whether to backup to Google Drive (defaults to false)
|
|
497
499
|
* @returns Promise with backup metadata including share locations and IDs
|
|
498
500
|
*/
|
|
499
|
-
storeEncryptedBackupByWallet({ accountAddress, clientKeyShares, password, signedSessionId, cloudProviders, delegatedKeyshare, passwordUpdateBatchId, }: {
|
|
501
|
+
storeEncryptedBackupByWallet({ accountAddress, clientKeyShares, password, signedSessionId, cloudProviders, delegatedKeyshare, passwordUpdateBatchId, googleDriveAccessToken, }: {
|
|
500
502
|
accountAddress: string;
|
|
501
503
|
clientKeyShares?: ClientKeyShare[];
|
|
502
504
|
password?: string;
|
|
@@ -504,6 +506,7 @@ export declare class DynamicWalletClient {
|
|
|
504
506
|
cloudProviders?: BackupLocation[];
|
|
505
507
|
delegatedKeyshare?: ClientKeyShare;
|
|
506
508
|
passwordUpdateBatchId?: string;
|
|
509
|
+
googleDriveAccessToken?: string;
|
|
507
510
|
}): Promise<{
|
|
508
511
|
keyShareIds: string[];
|
|
509
512
|
keygenIds: string[];
|
|
@@ -571,6 +574,7 @@ export declare class DynamicWalletClient {
|
|
|
571
574
|
* @throws Error if no Google OAuth account ID is found
|
|
572
575
|
*/
|
|
573
576
|
private getGoogleOauthAccountIdOrThrow;
|
|
577
|
+
private fetchGoogleDriveAccessToken;
|
|
574
578
|
/**
|
|
575
579
|
* Helper function to determine keyshare recovery strategy for dynamic shares.
|
|
576
580
|
* For REFRESH operations, retrieves enough shares to meet the client threshold.
|
|
@@ -618,11 +622,14 @@ export declare class DynamicWalletClient {
|
|
|
618
622
|
* @param params.accountAddress - The wallet account address to backup
|
|
619
623
|
* @param params.password - Optional password for encryption (uses environment ID if not provided)
|
|
620
624
|
* @param params.signedSessionId - Optional signed session ID for authentication
|
|
625
|
+
* @param params.googleDriveAccessToken - Optional Google OAuth access token. When provided, the SDK uses it directly
|
|
626
|
+
* instead of looking up the user's linked Google account and exchanging it for a token via the Dynamic backend.
|
|
621
627
|
*/
|
|
622
|
-
backupKeySharesToGoogleDrive({ accountAddress, password, signedSessionId, }: {
|
|
628
|
+
backupKeySharesToGoogleDrive({ accountAddress, password, signedSessionId, googleDriveAccessToken, }: {
|
|
623
629
|
accountAddress: string;
|
|
624
630
|
password?: string;
|
|
625
631
|
signedSessionId: string;
|
|
632
|
+
googleDriveAccessToken?: string;
|
|
626
633
|
}): Promise<void>;
|
|
627
634
|
/**
|
|
628
635
|
* This method handles the complete flow for ensuring wallet key shares are backed up to iCloud:
|
|
@@ -644,6 +651,7 @@ export declare class DynamicWalletClient {
|
|
|
644
651
|
* @param provider - The cloud backup provider (GOOGLE_DRIVE, ICLOUD, etc.)
|
|
645
652
|
* @param accountAddress - Wallet account address
|
|
646
653
|
* @param encryptedKeyShares - Already encrypted key shares to upload
|
|
654
|
+
* @param googleDriveAccessToken - Optional Google OAuth access token used when provider is GOOGLE_DRIVE
|
|
647
655
|
* @returns Promise<void>
|
|
648
656
|
*/
|
|
649
657
|
private uploadToCloudProvider;
|
|
@@ -657,6 +665,7 @@ export declare class DynamicWalletClient {
|
|
|
657
665
|
* @param params.accountAddress - The wallet account address
|
|
658
666
|
* @param params.password - Optional password for encryption (uses environment ID if not provided)
|
|
659
667
|
* @param params.encryptedKeyShares - The specific key shares to upload to Google Drive
|
|
668
|
+
* @param params.googleDriveAccessToken - Optional Google OAuth access token. When provided, skips the on-the-fly token fetch.
|
|
660
669
|
* @returns Promise<string[]> - Array of Google Drive key share IDs that were uploaded
|
|
661
670
|
*/
|
|
662
671
|
private uploadKeySharesToGoogleDrive;
|
|
@@ -668,10 +677,11 @@ export declare class DynamicWalletClient {
|
|
|
668
677
|
* @returns Promise<void>
|
|
669
678
|
*/
|
|
670
679
|
private uploadKeySharesToICloud;
|
|
671
|
-
exportClientKeysharesFromGoogleDrive({ accountAddress, password, signedSessionId, }: {
|
|
680
|
+
exportClientKeysharesFromGoogleDrive({ accountAddress, password, signedSessionId, googleDriveAccessToken, }: {
|
|
672
681
|
accountAddress: string;
|
|
673
682
|
password?: string;
|
|
674
683
|
signedSessionId: string;
|
|
684
|
+
googleDriveAccessToken?: string;
|
|
675
685
|
}): Promise<void>;
|
|
676
686
|
exportClientKeyshares({ accountAddress, password, signedSessionId, }: {
|
|
677
687
|
accountAddress: string;
|
package/src/client.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../packages/src/client.ts"],"names":[],"mappings":"AAAA,OAAO,EAKL,cAAc,EAGd,WAAW,EACX,KAAK,cAAc,EACpB,MAAM,eAAe,CAAC;AACvB,OAAO,EACL,QAAQ,EACR,cAAc,EACd,gBAAgB,EAOhB,wBAAwB,EACxB,eAAe,EAWf,KAAK,oCAAoC,EAEzC,KAAK,aAAa,EAClB,KAAK,wBAAwB,EAC7B,KAAK,YAAY,EACjB,KAAK,iBAAiB,EACtB,KAAK,OAAO,EACZ,KAAK,gBAAgB,EACrB,KAAK,kBAAkB,EACvB,KAAK,oBAAoB,EACzB,KAAK,YAAY,EACjB,KAAK,mBAAmB,EAEzB,MAAM,2BAA2B,CAAC;AAKnC,OAAO,EAAE,YAAY,EAAE,KAAK,kBAAkB,EAAE,MAAM,4BAA4B,CAAC;AAenF,OAAO,KAAK,EAAE,sBAAsB,EAAE,cAAc,EAAa,MAAM,gBAAgB,CAAC;AAexF,OAAO,EAKL,KAAK,gBAAgB,EACtB,MAAM,4BAA4B,CAAC;AAEpC,OAAO,EAQL,KAAK,IAAI,EACT,KAAK,iBAAiB,EACtB,KAAK,gBAAgB,EACtB,MAAM,YAAY,CAAC;AAmBpB,KAAK,aAAa,GAAG,MAAM,GAAG,UAAU,GAAG,WAAW,CAAC;AAEvD;;;GAGG;AACH,MAAM,WAAW,kCAAkC;IACjD,aAAa,CAAC,EAAE,oBAAoB,CAAC;IACrC;;;;OAIG;IACH,kBAAkB,CAAC,EAAE,MAAM,OAAO,CAAC,MAAM,CAAC,CAAC;CAC5C;AAED,qBAAa,mBAAmB;IACvB,aAAa,EAAE,MAAM,CAAC;IACtB,UAAU,EAAE,MAAM,CAAC;IACnB,KAAK,EAAE,OAAO,CAAC;IAEtB,SAAS,CAAC,MAAM,EAAE,MAAM,GAAG,SAAS,CAAa;IACjD,SAAS,CAAC,SAAS,EAAE,MAAM,GAAG,SAAS,CAAa;IAEpD,SAAS,CAAC,iBAAiB,EAAE,OAAO,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAQ;IACrE,SAAS,CAAC,MAAM,EAAE,OAAO,CAAC;IAC1B,SAAS,CAAC,SAAS,EAAE,gBAAgB,CAAC;IACtC,SAAS,CAAC,SAAS,EAAE,MAAM,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAM;IAC3D,SAAS,CAAC,OAAO,EAAG,gBAAgB,CAAC;IACrC,SAAS,CAAC,aAAa,EAAE;QAAE,CAAC,GAAG,EAAE,MAAM,GAAG,MAAM,CAAA;KAAE,GAAG,IAAI,CAAQ;IACjE,SAAS,CAAC,kBAAkB,CAAC,EAAE,MAAM,CAAC;IACtC,SAAS,CAAC,MAAM,EAAE,iBAAiB,GAAG,IAAI,CAAQ;IAClD,SAAS,CAAC,iBAAiB,UAAS;IACpC,QAAQ,CAAC,UAAU,EAAE,MAAM,CAAC;IAC5B,QAAQ,CAAC,YAAY,EAAE,MAAM,CAAC;IAC9B,QAAQ,CAAC,YAAY,EAAE,YAAY,CAAM;IACzC,SAAS,CAAC,QAAQ,EAAE,QAAQ,CAAC;IAC7B,SAAS,CAAC,UAAU,CAAC,EAAE,MAAM,CAAC;IAC9B,SAAS,CAAC,8BAA8B,CAAC,EAAE,MAAM,CAAC;IAClD,SAAS,CAAC,MAAM,CAAC,KAAK,EAAE,MAAM,CAAC,MAAM,EAAE,IAAI,EAAE,CAAC,CAAM;IACpD,SAAS,CAAC,MAAM,CAAC,iBAAiB,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAM;IACjE,OAAO,CAAC,MAAM,CAAC,iBAAiB,CAAoC;IAEpE;;;;OAIG;IACH,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAuB;IAEtD;;;;OAIG;IACH,OAAO,CAAC,QAAQ,CAAC,0BAA0B,CAAC,CAAwB;IAEpE;;;OAGG;YACW,sBAAsB;gBAalC,EACE,aAAa,EACb,UAAU,EACV,kBAAkB,EAClB,UAAU,EACV,KAAK,EACL,YAAY,EACZ,QAA0B,EAC1B,SAAqB,EACrB,sBAAsB,EAEtB,UAAU,EACV,gBAAgB,EAChB,8BAA8B,EAC9B,YAAY,EACZ,MAAM,GACP,EAAE,wBAAwB,EAC3B,eAAe,CAAC,EAAE,kCAAkC;IA0EtD;;OAEG;WACW,mBAAmB,CAAC,cAAc,EAAE,MAAM,GAAG,OAAO;IAIlE;;OAEG;WACW,YAAY,CAAC,cAAc,EAAE,MAAM,GAAG,OAAO;IAI3D;;OAEG;WACW,oBAAoB,CAAC,cAAc,EAAE,MAAM,GAAG,OAAO;IAInE;;;;OAIG;WACW,gBAAgB,IAAI,IAAI;IAItC;;;OAGG;IACH,SAAS,CAAC,gBAAgB,CAAC,cAAc,EAAE,MAAM,GAAG,gBAAgB,GAAG,SAAS;IAIhF;;;;OAIG;cACa,oBAAoB,CAAC,cAAc,EAAE,MAAM,EAAE,eAAe,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,gBAAgB,CAAC;IAuBjH;;;OAGG;IACH,SAAS,CAAC,eAAe,CAAC,cAAc,EAAE,MAAM,EAAE,OAAO,EAAE,OAAO,CAAC,gBAAgB,CAAC,GAAG,IAAI;IAQpF,WAAW,IAAI,QAAQ;IAI9B;;;OAGG;IACU,sBAAsB;IAInC;;;;OAIG;IACH,OAAO,CAAC,uBAAuB;IA8BzB,iBAAiB,CAAC,SAAS,EAAE,MAAM;IA8CnC,UAAU,CAAC,YAAY,CAAC,EAAE,YAAY,GAAG,OAAO,CAAC,gBAAgB,CAAC;IAYxE;;OAEG;cACa,WAAW,CAAC,YAAY,CAAC,EAAE,YAAY,GAAG,OAAO,CAAC,gBAAgB,CAAC;IAyB7E,sBAAsB,CAAC,EAC3B,SAAS,EACT,eAAe,EACf,gBAAgB,EAChB,wBAAwB,EACxB,aAAa,EACb,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,EAAE,CAAC;QAC1B,gBAAgB,EAAE,MAAM,CAAC;QACzB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE;IAqBK,sBAAsB,CAAC,EAC3B,SAAS,EACT,wBAAwB,EACxB,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC,sBAAsB,EAAE,CAAC;IAmB/B,eAAe,CAAC,EACpB,SAAS,EACT,QAAQ,EACR,cAAc,EACd,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;QACxC,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;IAiB7D;;;;;;;;;;;;;;OAcG;IACG,sBAAsB,CAAC,EAC3B,SAAS,EACT,MAAM,EACN,eAAe,EACf,uBAAuB,EACvB,wBAAwB,EACxB,aAAa,EACb,gBAAgB,EAChB,YAAY,GACb,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,MAAM,CAAC;QACf,eAAe,EAAE,MAAM,EAAE,CAAC;QAC1B,uBAAuB,EAAE,sBAAsB,EAAE,CAAC;QAClD,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,gBAAgB,CAAC,EAAE,MAAM,CAAC;QAC1B,YAAY,CAAC,EAAE,YAAY,CAAC;KAC7B,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,mBAAmB,EAAE,cAAc,EAAE,CAAC;KACvC,CAAC;IAsEI,YAAY,CAAC,EACjB,SAAS,EACT,MAAM,EACN,eAAe,EACf,uBAAuB,EACvB,wBAAwB,EACxB,aAAa,EACb,gBAAgB,EAChB,YAAY,GACb,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,MAAM,CAAC;QACf,eAAe,EAAE,MAAM,EAAE,CAAC;QAC1B,uBAAuB,EAAE,sBAAsB,EAAE,CAAC;QAClD,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,gBAAgB,CAAC,EAAE,MAAM,CAAC;QAC1B,YAAY,CAAC,EAAE,YAAY,CAAC;KAC7B,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,mBAAmB,EAAE,cAAc,EAAE,CAAC;KACvC,CAAC;IA2FI,MAAM,CAAC,EACX,SAAS,EACT,wBAAwB,EACxB,aAAa,EACb,OAAO,EACP,kBAAkB,EAClB,YAAY,EACZ,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;QACxE,YAAY,CAAC,EAAE,YAAY,CAAC;QAC5B,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,eAAe,EAAE,cAAc,EAAE,CAAC;KACnC,CAAC;IAmFI,mBAAmB,CAAC,EACxB,SAAS,EACT,UAAU,EACV,wBAAwB,EACxB,aAAa,EACb,OAAO,EACP,kBAAkB,EAClB,YAAY,EACZ,cAAc,EACd,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,UAAU,EAAE,MAAM,CAAC;QACnB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;QACxE,YAAY,CAAC,EAAE,YAAY,CAAC;QAC5B,4DAA4D;QAC5D,cAAc,CAAC,EAAE,MAAM,CAAC;QACxB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,eAAe,EAAE,cAAc,EAAE,CAAC;KACnC,CAAC;IA2HI,UAAU,CAAC,EACf,QAAQ,EACR,OAAO,EACP,WAAW,EACX,QAAQ,EACR,mBAAmB,EACnB,MAAM,EACN,OAAO,EACP,OAAO,EACP,gBAAgB,EAChB,YAAY,EACZ,aAAa,GACd,EAAE;QACD,QAAQ,EAAE,MAAM,CAAC;QACjB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,gBAAgB,EAAE,MAAM,CAAC;QACzB,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,mBAAmB,CAAC,EAAE,MAAM,CAAC;QAC7B,MAAM,CAAC,EAAE,MAAM,CAAC;QAChB,OAAO,CAAC,EAAE,kBAAkB,CAAC;QAC7B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,YAAY,CAAC,EAAE,YAAY,CAAC;QAC5B,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B;IA0BD,OAAO,CAAC,2BAA2B;IA0BnC,OAAO,CAAC,qBAAqB;IAW7B,OAAO,CAAC,0BAA0B;IAO5B,oBAAoB,CAAC,EACzB,SAAS,EACT,OAAO,EACP,MAAM,EACN,QAAQ,EACR,cAAc,EACd,gBAAgB,EAChB,gBAAgB,EAChB,WAAW,EACX,YAAY,EACZ,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,MAAM,EAAE,MAAM,CAAC;QACf,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;QACxC,gBAAgB,EAAE,aAAa,CAAC;QAChC,gBAAgB,EAAE,MAAM,CAAC;QACzB,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,YAAY,CAAC,EAAE,YAAY,CAAC;QAC5B,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IAgDlC,UAAU,CAAC,EACf,SAAS,EACT,OAAO,EACP,MAAM,EACN,QAAQ,EACR,cAAc,EACd,WAAW,EACX,gBAAgB,EAChB,YAAY,EACZ,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,MAAM,EAAE,MAAM,CAAC;QACf,gBAAgB,EAAE,MAAM,CAAC;QACzB,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;QACxC,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,YAAY,CAAC,EAAE,YAAY,CAAC;QAC5B,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IA8ExC;;;;;;;OAOG;YACW,0BAA0B;IA8DlC,IAAI,CAAC,EACT,cAAc,EACd,OAAO,EACP,SAAS,EACT,QAAoB,EACpB,WAAmB,EACnB,eAAe,EACf,QAAQ,EACR,mBAAmB,EACnB,OAAO,EACP,OAAO,EACP,YAAY,EACZ,aAAa,GACd,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,eAAe,EAAE,MAAM,CAAC;QACxB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,mBAAmB,CAAC,EAAE,MAAM,CAAC;QAC7B,OAAO,CAAC,EAAE,kBAAkB,CAAC;QAC7B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,YAAY,CAAC,EAAE,YAAY,CAAC;QAC5B,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;YAmB1B,YAAY;IAqMpB,0BAA0B,CAAC,EAC/B,cAAc,EACd,SAAS,EACT,QAAoB,EACpB,eAAe,EACf,QAAQ,EACR,mBAAmB,EACnB,YAAY,GACb,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;QACxB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,mBAAmB,CAAC,EAAE,MAAM,CAAC;QAC7B,YAAY,CAAC,EAAE,YAAY,CAAC;KAC7B;IAcD;;;;;;;;;OASG;IACH,OAAO,CAAC,gCAAgC;IAmDxC;;;OAGG;IACH,OAAO,CAAC,wBAAwB;YAclB,kCAAkC;IAyI1C,WAAW,CAAC,EAChB,SAAS,EACT,cAAc,EACd,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,cAAc,EAAE,cAAc,CAAC;QAC/B,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B;IAmCD;;;;;;;;;;;;;OAaG;IACG,eAAe,CAAC,EACpB,SAAS,EACT,MAAM,EACN,cAAc,EACd,2BAA2B,EAC3B,2BAA2B,GAC5B,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,gBAAgB,CAAC;QACzB,cAAc,EAAE,MAAM,CAAC;QACvB,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,2BAA2B,EAAE,wBAAwB,CAAC;KACvD,GAAG,OAAO,CAAC;QACV,0BAA0B,EAAE,sBAAsB,EAAE,CAAC;QACrD,kBAAkB,EAAE,MAAM,EAAE,CAAC;QAC7B,uBAAuB,EAAE,MAAM,EAAE,CAAC;QAClC,uBAAuB,EAAE,cAAc,EAAE,CAAC;KAC3C,CAAC;IA+CI,OAAO,CAAC,EACZ,SAAS,EACT,cAAc,EACd,2BAA2B,EAC3B,2BAA2B,EAC3B,QAAoB,EACpB,eAAe,EACf,cAAmB,EACnB,4BAAoC,EACpC,QAAQ,EACR,mBAAmB,EACnB,gBAAwB,GACzB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,cAAc,EAAE,MAAM,CAAC;QACvB,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;QACxB,cAAc,CAAC,EAAE,cAAc,EAAE,CAAC;QAClC,4BAA4B,CAAC,EAAE,OAAO,CAAC;QACvC,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,mBAAmB,CAAC,EAAE,MAAM,CAAC;QAC7B,gBAAgB,CAAC,EAAE,OAAO,CAAC;KAC5B;YAkBa,eAAe;YA4Uf,0BAA0B;IAiElC,iBAAiB,CAAC,EACtB,cAAc,EACd,QAAoB,EACpB,eAAe,EACf,QAAQ,GACT,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;QACxB,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB;IAeK,gBAAgB,CAAC,EACrB,cAAc,EACd,QAAoB,EACpB,eAAe,EACf,QAAQ,GACT,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;QACxB,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB;IAYD,OAAO,CAAC,kBAAkB;IAgBpB,SAAS,CAAC,EACd,cAAc,EACd,SAAS,EACT,aAAa,EACb,QAAoB,EACpB,eAAe,EACf,QAAQ,EACR,mBAAmB,EACnB,YAAY,GACb,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,SAAS,EAAE,MAAM,CAAC;QAClB,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;QACxB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,mBAAmB,CAAC,EAAE,MAAM,CAAC;QAC7B,YAAY,CAAC,EAAE,YAAY,CAAC;KAC7B;;;YA6Ea,wBAAwB;YAkBxB,gBAAgB;YAgChB,0BAA0B;IAgBlC,gBAAgB,CAAC,EACrB,SAAS,EACT,SAAS,EACT,cAAc,GACf,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,SAAS,EAAE,cAAc,EAAE,CAAC;QAC5B,cAAc,CAAC,EAAE,MAAM,CAAC;KACzB,GAAG,OAAO,CAAC;QACV,iBAAiB,EAAE,MAAM,GAAG,SAAS,CAAC;QACtC,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;KAChE,CAAC;IAoDI,eAAe,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE;QAAE,QAAQ,EAAE,cAAc,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE;IAW7F;;OAEG;YACW,kCAAkC;IAsChD;;;OAGG;IACG,6BAA6B,CAAC,EAAE,cAAc,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAA;KAAE,GAAG,OAAO,CAAC,cAAc,EAAE,CAAC;IAsB9G;;;;;;;;;;;OAWG;IACH,SAAS,CAAC,wBAAwB,CAAC,EACjC,cAAc,EACd,QAAQ,EACR,SAAS,EACT,wBAAwB,EACxB,cAAc,EACd,eAAoB,GACrB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,EAAE,MAAM,CAAC;QACjB,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,cAAc,CAAC,EAAE,MAAM,CAAC;QACxB,eAAe,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;KAC3C,GAAG,IAAI;IAqBR;;;OAGG;YACW,gCAAgC;IAyB9C;;;OAGG;IACG,2BAA2B,CAAC,EAChC,cAAc,EACd,eAAe,EACf,gBAA0B,GAC3B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,EAAE,cAAc,EAAE,CAAC;QAClC,gBAAgB,CAAC,EAAE,WAAW,GAAG,OAAO,CAAC;KAC1C,GAAG,OAAO,CAAC,IAAI,CAAC;IAoCjB;;;;;;;OAOG;YACW,iBAAiB;YAYjB,sBAAsB;YAsEtB,0BAA0B;IAqCxC;;;;;;;OAOG;YACW,4BAA4B;YAY5B,qBAAqB;YAyCrB,qBAAqB;IAyDnC,OAAO,CAAC,gCAAgC;IAsBlC,4BAA4B,CAAC,EACjC,cAAc,EACd,QAAQ,EACR,eAAe,EACf,YAAY,EACZ,yBAAiC,EACjC,qBAAqB,GACtB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,CAAC,EAAE,MAAM,CAAC;QACzB,YAAY,EAAE,iBAAiB,CAAC;QAChC,yBAAyB,CAAC,EAAE,OAAO,CAAC;QACpC,qBAAqB,CAAC,EAAE,MAAM,CAAC;KAChC;;;;;;;;8BAr9FE,CAAA;;;IAgsGH;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA8BG;IACG,4BAA4B,CAAC,EACjC,cAAc,EACd,eAA2B,EAC3B,QAAoB,EACpB,eAAe,EACf,cAAmB,EACnB,iBAA6B,EAC7B,qBAAqB,GACtB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,cAAc,EAAE,CAAC;QACnC,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,CAAC,EAAE,MAAM,CAAC;QACzB,cAAc,CAAC,EAAE,cAAc,EAAE,CAAC;QAClC,iBAAiB,CAAC,EAAE,cAAc,CAAC;QACnC,qBAAqB,CAAC,EAAE,MAAM,CAAC;KAChC;;;;;;;;;;8BA/uGE,CAAA;;;IAyzGG,cAAc,CAAC,EACnB,cAAc,EACd,gBAAgB,EAChB,WAAW,EACX,eAAe,EACf,qBAAqB,GACtB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,gBAAgB,CAAC,EAAE,MAAM,CAAC;QAC1B,WAAW,CAAC,EAAE,MAAM,CAAC;QACrB,eAAe,EAAE,MAAM,CAAC;QACxB,qBAAqB,CAAC,EAAE,MAAM,CAAC;KAChC;IAuCK,WAAW,CAAC,EAChB,cAAc,EACd,WAAW,EACX,eAAe,EACf,qBAAqB,GACtB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,WAAW,EAAE,MAAM,CAAC;QACpB,eAAe,EAAE,MAAM,CAAC;QACxB,qBAAqB,CAAC,EAAE,MAAM,CAAC;KAChC;IA+BK,eAAe,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE;QAAE,QAAQ,EAAE,MAAM,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE,GAAG,OAAO,CAAC,cAAc,CAAC;IAW/G;;;;;;;OAOG;IACH;;;;OAIG;YACW,sCAAsC;IA4DpD,OAAO,CAAC,kBAAkB;IAI1B,OAAO,CAAC,sBAAsB;cAMd,uCAAuC,CAAC,EACtD,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB,GAAG,OAAO,CAAC,IAAI,CAAC;IAiCjB;;;;OAIG;cACa,iCAAiC,CAAC,EAChD,cAAc,EACd,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB,GAAG,OAAO,CAAC,IAAI,CAAC;IA8BjB;;;;;OAKG;YACW,8BAA8B;IAmC5C;;;;;;;;;;;OAWG;IACH,eAAe,CAAC,EACd,wBAAwB,EACxB,wBAAwB,EACxB,eAAe,EACf,UAAsB,GACvB,EAAE;QACD,wBAAwB,EAAE,kBAAkB,CAAC;QAC7C,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,eAAe,EAAE,eAAe,CAAC;QACjC,UAAU,CAAC,EAAE,MAAM,CAAC;KACrB,GAAG;QACF,MAAM,EAAE,OAAO,CAAC,MAAM,CAAC,cAAc,EAAE,MAAM,EAAE,CAAC,CAAC,CAAC;QAClD,kBAAkB,EAAE,MAAM,CAAC;KAC5B;IA2CK,8BAA8B,CAAC,EACnC,cAAc,EACd,QAAQ,EACR,eAAe,EACf,eAAe,EACf,UAAsB,EACtB,oBAA2B,EAC3B,QAAQ,GACT,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,eAAe,CAAC;QACjC,eAAe,EAAE,MAAM,CAAC;QACxB,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,oBAAoB,CAAC,EAAE,OAAO,CAAC;QAC/B,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB,GAAG,OAAO,CAAC,cAAc,EAAE,CAAC;YAcf,sCAAsC;IAyF9C,cAAc;IAmCpB;;;;OAIG;YACW,8BAA8B;IAsD5C;;;;;;;;;OASG;IACG,4BAA4B,CAAC,EACjC,cAAc,EACd,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB,GAAG,OAAO,CAAC,IAAI,CAAC;IAWjB;;;;;;;;;OASG;IACG,uBAAuB,CAAC,EAC5B,cAAc,EACd,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB,GAAG,OAAO,CAAC,IAAI,CAAC;IASjB;;;;;;OAMG;YACW,qBAAqB;IA2BnC;;;;;;;;;;;OAWG;YACW,4BAA4B;IAuD1C;;;;;;OAMG;YACW,uBAAuB;IAkC/B,oCAAoC,CAAC,EACzC,cAAc,EACd,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB,GAAG,OAAO,CAAC,IAAI,CAAC;IA6GX,qBAAqB,CAAC,EAC1B,cAAc,EACd,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB;IAmCK,kBAAkB,CAAC,EACvB,cAAc,EACd,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB;IAYD;;;;;OAKG;YACW,iBAAiB;IAsD/B;;;;OAIG;IACG,cAAc,CAAC,EACnB,cAAc,EACd,QAAoB,EACpB,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB;IAwBK,mBAAmB,CAAC,EAAE,cAAc,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAA;KAAE,GAAG,OAAO,CAAC,OAAO,CAAC;IAK3F;;OAEG;IACG,4BAA4B,CAAC,EACjC,cAAc,EACd,eAAiD,GAClD,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;KACnC,GAAG,OAAO,CAAC,OAAO,CAAC;IAYpB;;OAEG;IACG,uCAAuC,CAAC,EAC5C,cAAc,EACd,eAAiD,GAClD,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;KACnC,GAAG,OAAO,CAAC,OAAO,CAAC;IAsBd,iCAAiC,CAAC,EAAE,cAAc,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAA;KAAE,GAAG,OAAO,CAAC,kBAAkB,CAAC;IA8B9G,SAAS,CAAC,EACd,cAAc,EACd,eAA8C,EAC9C,UAAsB,EACtB,QAAoB,EACpB,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;QAClC,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB,GAAG,OAAO,CAAC,gBAAgB,CAAC;IAsL7B;;;;;;;;;;;;;;;OAeG;IACG,sBAAsB,CAAC,EAC3B,cAAc,EACd,eAAe,EACf,QAAQ,GACT,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,MAAM,CAAC;QACzB,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB,GAAG,OAAO,CAAC,mBAAmB,CAAC;IA4ChC;;;;;;;;OAQG;IACG,YAAY,CAAC,EACjB,cAAc,EACd,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,EAAE,MAAM,CAAC;QACjB,eAAe,EAAE,MAAM,CAAC;KACzB,GAAG,OAAO,CAAC,gBAAgB,CAAC;IAkG7B;;OAEG;YACW,2BAA2B;IA8BnC,aAAa,IAAI,OAAO,CAAC,iBAAiB,EAAE,CAAC;IAI7C,UAAU;IA8EhB;;;OAGG;IACH,aAAa,CAAC,SAAS,EAAE,MAAM;IAQzB,WAAW,CAAC,EAChB,QAAQ,EACR,wBAAwB,EACxB,SAAa,GACd,EAAE;QACD,QAAQ,EAAE,YAAY,CAAC;QACvB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,SAAS,CAAC,EAAE,MAAM,CAAC;KACpB;IAyDK,YAAY,IAAI,OAAO,CAAC,MAAM,CAAC,MAAM,EAAE,IAAI,EAAE,CAAC,CAAC;IAiC/C,QAAQ,CACZ,QAAQ,CAAC,EAAE,YAAY,EACvB,wBAAwB,CAAC,EAAE,wBAAwB,GAClD,OAAO,CAAC,IAAI,EAAE,GAAG,MAAM,CAAC,MAAM,EAAE,IAAI,EAAE,CAAC,CAAC;IAQrC,QAAQ,CAAC,eAAe,EAAE,MAAM,EAAE,KAAK,EAAE,IAAI,EAAE;IAKrD;;;;OAIG;IACH,OAAO,CAAC,YAAY;IASpB,kBAAkB,CAAC,QAAQ,EAAE,YAAY,EAAE,wBAAwB,EAAE,wBAAwB,GAAG,MAAM;IAKhG,OAAO,CAAC,QAAQ,EAAE,YAAY,EAAE,wBAAwB,EAAE,wBAAwB,GAAG,OAAO,CAAC,IAAI,GAAG,SAAS,CAAC;IA0DpH,eAAe,CAAC,YAAY,CAAC,EAAE,YAAY,GAAG,YAAY,GAAG;QAAE,GAAG,EAAE,MAAM,CAAC;QAAC,IAAI,EAAE,MAAM,CAAA;KAAE;CAQ3F"}
|
|
1
|
+
{"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../packages/src/client.ts"],"names":[],"mappings":"AAAA,OAAO,EAKL,cAAc,EAGd,WAAW,EACX,KAAK,cAAc,EACpB,MAAM,eAAe,CAAC;AACvB,OAAO,EACL,QAAQ,EACR,cAAc,EACd,gBAAgB,EAOhB,wBAAwB,EACxB,eAAe,EAWf,KAAK,oCAAoC,EAEzC,KAAK,aAAa,EAClB,KAAK,wBAAwB,EAC7B,KAAK,YAAY,EACjB,KAAK,iBAAiB,EACtB,KAAK,OAAO,EACZ,KAAK,gBAAgB,EACrB,KAAK,kBAAkB,EACvB,KAAK,oBAAoB,EACzB,KAAK,YAAY,EACjB,KAAK,mBAAmB,EAEzB,MAAM,2BAA2B,CAAC;AAKnC,OAAO,EAAE,YAAY,EAAE,KAAK,kBAAkB,EAAE,MAAM,4BAA4B,CAAC;AAenF,OAAO,KAAK,EAAE,sBAAsB,EAAE,cAAc,EAAa,MAAM,gBAAgB,CAAC;AAexF,OAAO,EAKL,KAAK,gBAAgB,EACtB,MAAM,4BAA4B,CAAC;AAEpC,OAAO,EAQL,KAAK,IAAI,EACT,KAAK,iBAAiB,EACtB,KAAK,gBAAgB,EACtB,MAAM,YAAY,CAAC;AAmBpB,KAAK,aAAa,GAAG,MAAM,GAAG,UAAU,GAAG,WAAW,CAAC;AAEvD;;;GAGG;AACH,MAAM,WAAW,kCAAkC;IACjD,aAAa,CAAC,EAAE,oBAAoB,CAAC;IACrC;;;;OAIG;IACH,kBAAkB,CAAC,EAAE,MAAM,OAAO,CAAC,MAAM,CAAC,CAAC;CAC5C;AAED,qBAAa,mBAAmB;IACvB,aAAa,EAAE,MAAM,CAAC;IACtB,UAAU,EAAE,MAAM,CAAC;IACnB,KAAK,EAAE,OAAO,CAAC;IAEtB,SAAS,CAAC,MAAM,EAAE,MAAM,GAAG,SAAS,CAAa;IACjD,SAAS,CAAC,SAAS,EAAE,MAAM,GAAG,SAAS,CAAa;IAEpD,SAAS,CAAC,iBAAiB,EAAE,OAAO,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAQ;IACrE,SAAS,CAAC,MAAM,EAAE,OAAO,CAAC;IAC1B,SAAS,CAAC,SAAS,EAAE,gBAAgB,CAAC;IACtC,SAAS,CAAC,SAAS,EAAE,MAAM,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAM;IAC3D,SAAS,CAAC,OAAO,EAAG,gBAAgB,CAAC;IACrC,SAAS,CAAC,aAAa,EAAE;QAAE,CAAC,GAAG,EAAE,MAAM,GAAG,MAAM,CAAA;KAAE,GAAG,IAAI,CAAQ;IACjE,SAAS,CAAC,kBAAkB,CAAC,EAAE,MAAM,CAAC;IACtC,SAAS,CAAC,MAAM,EAAE,iBAAiB,GAAG,IAAI,CAAQ;IAClD,SAAS,CAAC,iBAAiB,UAAS;IACpC,QAAQ,CAAC,UAAU,EAAE,MAAM,CAAC;IAC5B,QAAQ,CAAC,YAAY,EAAE,MAAM,CAAC;IAC9B,QAAQ,CAAC,YAAY,EAAE,YAAY,CAAM;IACzC,SAAS,CAAC,QAAQ,EAAE,QAAQ,CAAC;IAC7B,SAAS,CAAC,UAAU,CAAC,EAAE,MAAM,CAAC;IAC9B,SAAS,CAAC,8BAA8B,CAAC,EAAE,MAAM,CAAC;IAClD,SAAS,CAAC,MAAM,CAAC,KAAK,EAAE,MAAM,CAAC,MAAM,EAAE,IAAI,EAAE,CAAC,CAAM;IACpD,SAAS,CAAC,MAAM,CAAC,iBAAiB,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAM;IACjE,OAAO,CAAC,MAAM,CAAC,iBAAiB,CAAoC;IAEpE;;;;OAIG;IACH,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAuB;IAEtD;;;;OAIG;IACH,OAAO,CAAC,QAAQ,CAAC,0BAA0B,CAAC,CAAwB;IAEpE;;;OAGG;YACW,sBAAsB;gBAalC,EACE,aAAa,EACb,UAAU,EACV,kBAAkB,EAClB,UAAU,EACV,KAAK,EACL,YAAY,EACZ,QAA0B,EAC1B,SAAqB,EACrB,sBAAsB,EAEtB,UAAU,EACV,gBAAgB,EAChB,8BAA8B,EAC9B,YAAY,EACZ,MAAM,GACP,EAAE,wBAAwB,EAC3B,eAAe,CAAC,EAAE,kCAAkC;IA0EtD;;OAEG;WACW,mBAAmB,CAAC,cAAc,EAAE,MAAM,GAAG,OAAO;IAIlE;;OAEG;WACW,YAAY,CAAC,cAAc,EAAE,MAAM,GAAG,OAAO;IAI3D;;OAEG;WACW,oBAAoB,CAAC,cAAc,EAAE,MAAM,GAAG,OAAO;IAInE;;;;OAIG;WACW,gBAAgB,IAAI,IAAI;IAItC;;;OAGG;IACH,SAAS,CAAC,gBAAgB,CAAC,cAAc,EAAE,MAAM,GAAG,gBAAgB,GAAG,SAAS;IAIhF;;;;OAIG;cACa,oBAAoB,CAAC,cAAc,EAAE,MAAM,EAAE,eAAe,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,gBAAgB,CAAC;IAuBjH;;;OAGG;IACH,SAAS,CAAC,eAAe,CAAC,cAAc,EAAE,MAAM,EAAE,OAAO,EAAE,OAAO,CAAC,gBAAgB,CAAC,GAAG,IAAI;IAQpF,WAAW,IAAI,QAAQ;IAI9B;;;OAGG;IACU,sBAAsB;IAInC;;;;OAIG;IACH,OAAO,CAAC,uBAAuB;IA8BzB,iBAAiB,CAAC,SAAS,EAAE,MAAM;IA8CnC,UAAU,CAAC,YAAY,CAAC,EAAE,YAAY,GAAG,OAAO,CAAC,gBAAgB,CAAC;IAYxE;;OAEG;cACa,WAAW,CAAC,YAAY,CAAC,EAAE,YAAY,GAAG,OAAO,CAAC,gBAAgB,CAAC;IAyB7E,sBAAsB,CAAC,EAC3B,SAAS,EACT,eAAe,EACf,gBAAgB,EAChB,wBAAwB,EACxB,aAAa,EACb,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,EAAE,CAAC;QAC1B,gBAAgB,EAAE,MAAM,CAAC;QACzB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE;IAqBK,sBAAsB,CAAC,EAC3B,SAAS,EACT,wBAAwB,EACxB,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC,sBAAsB,EAAE,CAAC;IAmB/B,eAAe,CAAC,EACpB,SAAS,EACT,QAAQ,EACR,cAAc,EACd,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;QACxC,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;IAiB7D;;;;;;;;;;;;;;OAcG;IACG,sBAAsB,CAAC,EAC3B,SAAS,EACT,MAAM,EACN,eAAe,EACf,uBAAuB,EACvB,wBAAwB,EACxB,aAAa,EACb,gBAAgB,EAChB,YAAY,GACb,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,MAAM,CAAC;QACf,eAAe,EAAE,MAAM,EAAE,CAAC;QAC1B,uBAAuB,EAAE,sBAAsB,EAAE,CAAC;QAClD,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,gBAAgB,CAAC,EAAE,MAAM,CAAC;QAC1B,YAAY,CAAC,EAAE,YAAY,CAAC;KAC7B,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,mBAAmB,EAAE,cAAc,EAAE,CAAC;KACvC,CAAC;IAsEI,YAAY,CAAC,EACjB,SAAS,EACT,MAAM,EACN,eAAe,EACf,uBAAuB,EACvB,wBAAwB,EACxB,aAAa,EACb,gBAAgB,EAChB,YAAY,GACb,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,MAAM,CAAC;QACf,eAAe,EAAE,MAAM,EAAE,CAAC;QAC1B,uBAAuB,EAAE,sBAAsB,EAAE,CAAC;QAClD,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,gBAAgB,CAAC,EAAE,MAAM,CAAC;QAC1B,YAAY,CAAC,EAAE,YAAY,CAAC;KAC7B,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,mBAAmB,EAAE,cAAc,EAAE,CAAC;KACvC,CAAC;IA2FI,MAAM,CAAC,EACX,SAAS,EACT,wBAAwB,EACxB,aAAa,EACb,OAAO,EACP,kBAAkB,EAClB,YAAY,EACZ,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;QACxE,YAAY,CAAC,EAAE,YAAY,CAAC;QAC5B,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,eAAe,EAAE,cAAc,EAAE,CAAC;KACnC,CAAC;IAmFI,mBAAmB,CAAC,EACxB,SAAS,EACT,UAAU,EACV,wBAAwB,EACxB,aAAa,EACb,OAAO,EACP,kBAAkB,EAClB,YAAY,EACZ,cAAc,EACd,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,UAAU,EAAE,MAAM,CAAC;QACnB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;QACxE,YAAY,CAAC,EAAE,YAAY,CAAC;QAC5B,4DAA4D;QAC5D,cAAc,CAAC,EAAE,MAAM,CAAC;QACxB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,eAAe,EAAE,cAAc,EAAE,CAAC;KACnC,CAAC;IA2HI,UAAU,CAAC,EACf,QAAQ,EACR,OAAO,EACP,WAAW,EACX,QAAQ,EACR,mBAAmB,EACnB,MAAM,EACN,OAAO,EACP,OAAO,EACP,gBAAgB,EAChB,YAAY,EACZ,aAAa,GACd,EAAE;QACD,QAAQ,EAAE,MAAM,CAAC;QACjB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,gBAAgB,EAAE,MAAM,CAAC;QACzB,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,mBAAmB,CAAC,EAAE,MAAM,CAAC;QAC7B,MAAM,CAAC,EAAE,MAAM,CAAC;QAChB,OAAO,CAAC,EAAE,kBAAkB,CAAC;QAC7B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,YAAY,CAAC,EAAE,YAAY,CAAC;QAC5B,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B;IA0BD,OAAO,CAAC,2BAA2B;IA0BnC,OAAO,CAAC,qBAAqB;IAW7B,OAAO,CAAC,0BAA0B;IAO5B,oBAAoB,CAAC,EACzB,SAAS,EACT,OAAO,EACP,MAAM,EACN,QAAQ,EACR,cAAc,EACd,gBAAgB,EAChB,gBAAgB,EAChB,WAAW,EACX,YAAY,EACZ,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,MAAM,EAAE,MAAM,CAAC;QACf,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;QACxC,gBAAgB,EAAE,aAAa,CAAC;QAChC,gBAAgB,EAAE,MAAM,CAAC;QACzB,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,YAAY,CAAC,EAAE,YAAY,CAAC;QAC5B,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IAgDlC,UAAU,CAAC,EACf,SAAS,EACT,OAAO,EACP,MAAM,EACN,QAAQ,EACR,cAAc,EACd,WAAW,EACX,gBAAgB,EAChB,YAAY,EACZ,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,MAAM,EAAE,MAAM,CAAC;QACf,gBAAgB,EAAE,MAAM,CAAC;QACzB,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;QACxC,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,YAAY,CAAC,EAAE,YAAY,CAAC;QAC5B,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IA8ExC;;;;;;;OAOG;YACW,0BAA0B;IA8DlC,IAAI,CAAC,EACT,cAAc,EACd,OAAO,EACP,SAAS,EACT,QAAoB,EACpB,WAAmB,EACnB,eAAe,EACf,QAAQ,EACR,mBAAmB,EACnB,OAAO,EACP,OAAO,EACP,YAAY,EACZ,aAAa,GACd,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,eAAe,EAAE,MAAM,CAAC;QACxB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,mBAAmB,CAAC,EAAE,MAAM,CAAC;QAC7B,OAAO,CAAC,EAAE,kBAAkB,CAAC;QAC7B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,YAAY,CAAC,EAAE,YAAY,CAAC;QAC5B,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;YAmB1B,YAAY;IAqMpB,0BAA0B,CAAC,EAC/B,cAAc,EACd,SAAS,EACT,QAAoB,EACpB,eAAe,EACf,QAAQ,EACR,mBAAmB,EACnB,YAAY,GACb,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;QACxB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,mBAAmB,CAAC,EAAE,MAAM,CAAC;QAC7B,YAAY,CAAC,EAAE,YAAY,CAAC;KAC7B;IAcD;;;;;;;;;OASG;IACH,OAAO,CAAC,gCAAgC;IAmDxC;;;OAGG;IACH,OAAO,CAAC,wBAAwB;YAclB,kCAAkC;IAyI1C,WAAW,CAAC,EAChB,SAAS,EACT,cAAc,EACd,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,cAAc,EAAE,cAAc,CAAC;QAC/B,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B;IAmCD;;;;;;;;;;;;;OAaG;IACG,eAAe,CAAC,EACpB,SAAS,EACT,MAAM,EACN,cAAc,EACd,2BAA2B,EAC3B,2BAA2B,GAC5B,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,gBAAgB,CAAC;QACzB,cAAc,EAAE,MAAM,CAAC;QACvB,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,2BAA2B,EAAE,wBAAwB,CAAC;KACvD,GAAG,OAAO,CAAC;QACV,0BAA0B,EAAE,sBAAsB,EAAE,CAAC;QACrD,kBAAkB,EAAE,MAAM,EAAE,CAAC;QAC7B,uBAAuB,EAAE,MAAM,EAAE,CAAC;QAClC,uBAAuB,EAAE,cAAc,EAAE,CAAC;KAC3C,CAAC;IA+CI,OAAO,CAAC,EACZ,SAAS,EACT,cAAc,EACd,2BAA2B,EAC3B,2BAA2B,EAC3B,QAAoB,EACpB,eAAe,EACf,cAAmB,EACnB,4BAAoC,EACpC,QAAQ,EACR,mBAAmB,EACnB,gBAAwB,EACxB,sBAAsB,GACvB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,cAAc,EAAE,MAAM,CAAC;QACvB,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;QACxB,cAAc,CAAC,EAAE,cAAc,EAAE,CAAC;QAClC,4BAA4B,CAAC,EAAE,OAAO,CAAC;QACvC,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,mBAAmB,CAAC,EAAE,MAAM,CAAC;QAC7B,gBAAgB,CAAC,EAAE,OAAO,CAAC;QAC3B,sBAAsB,CAAC,EAAE,MAAM,CAAC;KACjC;YAmBa,eAAe;YAgVf,0BAA0B;IAiElC,iBAAiB,CAAC,EACtB,cAAc,EACd,QAAoB,EACpB,eAAe,EACf,QAAQ,GACT,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;QACxB,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB;IAeK,gBAAgB,CAAC,EACrB,cAAc,EACd,QAAoB,EACpB,eAAe,EACf,QAAQ,GACT,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;QACxB,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB;IAYD,OAAO,CAAC,kBAAkB;IAgBpB,SAAS,CAAC,EACd,cAAc,EACd,SAAS,EACT,aAAa,EACb,QAAoB,EACpB,eAAe,EACf,QAAQ,EACR,mBAAmB,EACnB,YAAY,GACb,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,SAAS,EAAE,MAAM,CAAC;QAClB,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;QACxB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,mBAAmB,CAAC,EAAE,MAAM,CAAC;QAC7B,YAAY,CAAC,EAAE,YAAY,CAAC;KAC7B;;;YA6Ea,wBAAwB;YAkBxB,gBAAgB;YAgChB,0BAA0B;IAgBlC,gBAAgB,CAAC,EACrB,SAAS,EACT,SAAS,EACT,cAAc,GACf,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,SAAS,EAAE,cAAc,EAAE,CAAC;QAC5B,cAAc,CAAC,EAAE,MAAM,CAAC;KACzB,GAAG,OAAO,CAAC;QACV,iBAAiB,EAAE,MAAM,GAAG,SAAS,CAAC;QACtC,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;KAChE,CAAC;IAoDI,eAAe,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE;QAAE,QAAQ,EAAE,cAAc,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE;IAW7F;;OAEG;YACW,kCAAkC;IAsChD;;;OAGG;IACG,6BAA6B,CAAC,EAAE,cAAc,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAA;KAAE,GAAG,OAAO,CAAC,cAAc,EAAE,CAAC;IAsB9G;;;;;;;;;;;OAWG;IACH,SAAS,CAAC,wBAAwB,CAAC,EACjC,cAAc,EACd,QAAQ,EACR,SAAS,EACT,wBAAwB,EACxB,cAAc,EACd,eAAoB,GACrB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,EAAE,MAAM,CAAC;QACjB,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,cAAc,CAAC,EAAE,MAAM,CAAC;QACxB,eAAe,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;KAC3C,GAAG,IAAI;IAqBR;;;OAGG;YACW,gCAAgC;IAyB9C;;;OAGG;IACG,2BAA2B,CAAC,EAChC,cAAc,EACd,eAAe,EACf,gBAA0B,GAC3B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,EAAE,cAAc,EAAE,CAAC;QAClC,gBAAgB,CAAC,EAAE,WAAW,GAAG,OAAO,CAAC;KAC1C,GAAG,OAAO,CAAC,IAAI,CAAC;IAoCjB;;;;;;;OAOG;YACW,iBAAiB;YAYjB,sBAAsB;YAsEtB,0BAA0B;IAqCxC;;;;;;;OAOG;YACW,4BAA4B;YAY5B,qBAAqB;YA4CrB,qBAAqB;IAyDnC,OAAO,CAAC,gCAAgC;IAsBlC,4BAA4B,CAAC,EACjC,cAAc,EACd,QAAQ,EACR,eAAe,EACf,YAAY,EACZ,yBAAiC,EACjC,qBAAqB,EACrB,sBAAsB,GACvB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,CAAC,EAAE,MAAM,CAAC;QACzB,YAAY,EAAE,iBAAiB,CAAC;QAChC,yBAAyB,CAAC,EAAE,OAAO,CAAC;QACpC,qBAAqB,CAAC,EAAE,MAAM,CAAC;QAC/B,sBAAsB,CAAC,EAAE,MAAM,CAAC;KACjC;;;;;;;;8BAj+FE,CAAA;;;IA6sGH;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA8BG;IACG,4BAA4B,CAAC,EACjC,cAAc,EACd,eAA2B,EAC3B,QAAoB,EACpB,eAAe,EACf,cAAmB,EACnB,iBAA6B,EAC7B,qBAAqB,EACrB,sBAAsB,GACvB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,cAAc,EAAE,CAAC;QACnC,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,CAAC,EAAE,MAAM,CAAC;QACzB,cAAc,CAAC,EAAE,cAAc,EAAE,CAAC;QAClC,iBAAiB,CAAC,EAAE,cAAc,CAAC;QACnC,qBAAqB,CAAC,EAAE,MAAM,CAAC;QAC/B,sBAAsB,CAAC,EAAE,MAAM,CAAC;KACjC;;;;;;;;;;8BA9vGE,CAAA;;;IAy0GG,cAAc,CAAC,EACnB,cAAc,EACd,gBAAgB,EAChB,WAAW,EACX,eAAe,EACf,qBAAqB,GACtB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,gBAAgB,CAAC,EAAE,MAAM,CAAC;QAC1B,WAAW,CAAC,EAAE,MAAM,CAAC;QACrB,eAAe,EAAE,MAAM,CAAC;QACxB,qBAAqB,CAAC,EAAE,MAAM,CAAC;KAChC;IAuCK,WAAW,CAAC,EAChB,cAAc,EACd,WAAW,EACX,eAAe,EACf,qBAAqB,GACtB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,WAAW,EAAE,MAAM,CAAC;QACpB,eAAe,EAAE,MAAM,CAAC;QACxB,qBAAqB,CAAC,EAAE,MAAM,CAAC;KAChC;IA+BK,eAAe,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE;QAAE,QAAQ,EAAE,MAAM,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE,GAAG,OAAO,CAAC,cAAc,CAAC;IAW/G;;;;;;;OAOG;IACH;;;;OAIG;YACW,sCAAsC;IA4DpD,OAAO,CAAC,kBAAkB;IAI1B,OAAO,CAAC,sBAAsB;cAMd,uCAAuC,CAAC,EACtD,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB,GAAG,OAAO,CAAC,IAAI,CAAC;IAiCjB;;;;OAIG;cACa,iCAAiC,CAAC,EAChD,cAAc,EACd,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB,GAAG,OAAO,CAAC,IAAI,CAAC;IA8BjB;;;;;OAKG;YACW,8BAA8B;YAmC9B,2BAA2B;IAKzC;;;;;;;;;;;OAWG;IACH,eAAe,CAAC,EACd,wBAAwB,EACxB,wBAAwB,EACxB,eAAe,EACf,UAAsB,GACvB,EAAE;QACD,wBAAwB,EAAE,kBAAkB,CAAC;QAC7C,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,eAAe,EAAE,eAAe,CAAC;QACjC,UAAU,CAAC,EAAE,MAAM,CAAC;KACrB,GAAG;QACF,MAAM,EAAE,OAAO,CAAC,MAAM,CAAC,cAAc,EAAE,MAAM,EAAE,CAAC,CAAC,CAAC;QAClD,kBAAkB,EAAE,MAAM,CAAC;KAC5B;IA2CK,8BAA8B,CAAC,EACnC,cAAc,EACd,QAAQ,EACR,eAAe,EACf,eAAe,EACf,UAAsB,EACtB,oBAA2B,EAC3B,QAAQ,GACT,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,eAAe,CAAC;QACjC,eAAe,EAAE,MAAM,CAAC;QACxB,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,oBAAoB,CAAC,EAAE,OAAO,CAAC;QAC/B,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB,GAAG,OAAO,CAAC,cAAc,EAAE,CAAC;YAcf,sCAAsC;IAyF9C,cAAc;IAmCpB;;;;OAIG;YACW,8BAA8B;IA0D5C;;;;;;;;;;;OAWG;IACG,4BAA4B,CAAC,EACjC,cAAc,EACd,QAAQ,EACR,eAAe,EACf,sBAAsB,GACvB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;QACxB,sBAAsB,CAAC,EAAE,MAAM,CAAC;KACjC,GAAG,OAAO,CAAC,IAAI,CAAC;IAYjB;;;;;;;;;OASG;IACG,uBAAuB,CAAC,EAC5B,cAAc,EACd,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB,GAAG,OAAO,CAAC,IAAI,CAAC;IASjB;;;;;;;OAOG;YACW,qBAAqB;IA8BnC;;;;;;;;;;;;OAYG;YACW,4BAA4B;IAqD1C;;;;;;OAMG;YACW,uBAAuB;IAkC/B,oCAAoC,CAAC,EACzC,cAAc,EACd,QAAQ,EACR,eAAe,EACf,sBAAsB,GACvB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;QACxB,sBAAsB,CAAC,EAAE,MAAM,CAAC;KACjC,GAAG,OAAO,CAAC,IAAI,CAAC;IAyGX,qBAAqB,CAAC,EAC1B,cAAc,EACd,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB;IAmCK,kBAAkB,CAAC,EACvB,cAAc,EACd,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB;IAYD;;;;;OAKG;YACW,iBAAiB;IAsD/B;;;;OAIG;IACG,cAAc,CAAC,EACnB,cAAc,EACd,QAAoB,EACpB,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB;IAwBK,mBAAmB,CAAC,EAAE,cAAc,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAA;KAAE,GAAG,OAAO,CAAC,OAAO,CAAC;IAK3F;;OAEG;IACG,4BAA4B,CAAC,EACjC,cAAc,EACd,eAAiD,GAClD,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;KACnC,GAAG,OAAO,CAAC,OAAO,CAAC;IAYpB;;OAEG;IACG,uCAAuC,CAAC,EAC5C,cAAc,EACd,eAAiD,GAClD,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;KACnC,GAAG,OAAO,CAAC,OAAO,CAAC;IAsBd,iCAAiC,CAAC,EAAE,cAAc,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAA;KAAE,GAAG,OAAO,CAAC,kBAAkB,CAAC;IA8B9G,SAAS,CAAC,EACd,cAAc,EACd,eAA8C,EAC9C,UAAsB,EACtB,QAAoB,EACpB,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;QAClC,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB,GAAG,OAAO,CAAC,gBAAgB,CAAC;IAsL7B;;;;;;;;;;;;;;;OAeG;IACG,sBAAsB,CAAC,EAC3B,cAAc,EACd,eAAe,EACf,QAAQ,GACT,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,MAAM,CAAC;QACzB,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB,GAAG,OAAO,CAAC,mBAAmB,CAAC;IA4ChC;;;;;;;;OAQG;IACG,YAAY,CAAC,EACjB,cAAc,EACd,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,EAAE,MAAM,CAAC;QACjB,eAAe,EAAE,MAAM,CAAC;KACzB,GAAG,OAAO,CAAC,gBAAgB,CAAC;IAkG7B;;OAEG;YACW,2BAA2B;IA8BnC,aAAa,IAAI,OAAO,CAAC,iBAAiB,EAAE,CAAC;IAI7C,UAAU;IA8EhB;;;OAGG;IACH,aAAa,CAAC,SAAS,EAAE,MAAM;IAQzB,WAAW,CAAC,EAChB,QAAQ,EACR,wBAAwB,EACxB,SAAa,GACd,EAAE;QACD,QAAQ,EAAE,YAAY,CAAC;QACvB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,SAAS,CAAC,EAAE,MAAM,CAAC;KACpB;IAyDK,YAAY,IAAI,OAAO,CAAC,MAAM,CAAC,MAAM,EAAE,IAAI,EAAE,CAAC,CAAC;IAiC/C,QAAQ,CACZ,QAAQ,CAAC,EAAE,YAAY,EACvB,wBAAwB,CAAC,EAAE,wBAAwB,GAClD,OAAO,CAAC,IAAI,EAAE,GAAG,MAAM,CAAC,MAAM,EAAE,IAAI,EAAE,CAAC,CAAC;IAQrC,QAAQ,CAAC,eAAe,EAAE,MAAM,EAAE,KAAK,EAAE,IAAI,EAAE;IAKrD;;;;OAIG;IACH,OAAO,CAAC,YAAY;IASpB,kBAAkB,CAAC,QAAQ,EAAE,YAAY,EAAE,wBAAwB,EAAE,wBAAwB,GAAG,MAAM;IAKhG,OAAO,CAAC,QAAQ,EAAE,YAAY,EAAE,wBAAwB,EAAE,wBAAwB,GAAG,OAAO,CAAC,IAAI,GAAG,SAAS,CAAC;IA0DpH,eAAe,CAAC,YAAY,CAAC,EAAE,YAAY,GAAG,YAAY,GAAG;QAAE,GAAG,EAAE,MAAM,CAAC;QAAC,IAAI,EAAE,MAAM,CAAA;KAAE;CAQ3F"}
|
package/src/utils.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"utils.d.ts","sourceRoot":"","sources":["../../packages/src/utils.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,WAAW,EAAE,KAAK,cAAc,EAAE,MAAM,eAAe,CAAC;AACjE,OAAO,EACL,cAAc,EAGd,KAAK,kBAAkB,EACvB,KAAK,wBAAwB,EAC7B,KAAK,oBAAoB,EAC1B,MAAM,2BAA2B,CAAC;AACnC,OAAO,KAAK,EAAE,qBAAqB,EAAE,MAAM,4BAA4B,CAAC;AAOxE,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,gBAAgB,CAAC;AAIrD,eAAO,MAAM,SAAS,eAAsC,CAAC;AAE7D;;;GAGG;AACH,eAAO,MAAM,aAAa,WAAY,GAAG,KAAG,UAAU,GAAG,cAsBxD,CAAC;AAEF,eAAO,MAAM,+BAA+B,iEAIzC;IACD,wBAAwB,EAAE,wBAAwB,CAAC;IACnD,cAAc,EAAE,MAAM,CAAC;IACvB,aAAa,CAAC,EAAE,OAAO,CAAC;CACzB,WAGA,CAAC;AAEF,eAAO,MAAM,2BAA2B,YAAa;IACnD,gBAAgB,EAAE,oBAAoB,CAAC;CACxC,KAAG,kBAoCH,CAAC;AAEF;;;;;GAKG;AACH,eAAO,MAAM,oBAAoB,sBACZ,cAAc,EAAE,gBACrB,cAAc,EAAE,KAC7B,cAAc,EAchB,CAAC;AAEF,eAAO,MAAM,cAAc,2BAAyC;IAAE,QAAQ,EAAE,MAAM,CAAC;IAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;CAAE,qBAI1G,CAAC;AAEF,UAAU,WAAW;IACnB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,aAAa,CAAC,EAAE,MAAM,CAAC;IACvB,aAAa,CAAC,EAAE,MAAM,CAAC;IACvB,UAAU,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;CACtC;
|
|
1
|
+
{"version":3,"file":"utils.d.ts","sourceRoot":"","sources":["../../packages/src/utils.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,WAAW,EAAE,KAAK,cAAc,EAAE,MAAM,eAAe,CAAC;AACjE,OAAO,EACL,cAAc,EAGd,KAAK,kBAAkB,EACvB,KAAK,wBAAwB,EAC7B,KAAK,oBAAoB,EAC1B,MAAM,2BAA2B,CAAC;AACnC,OAAO,KAAK,EAAE,qBAAqB,EAAE,MAAM,4BAA4B,CAAC;AAOxE,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,gBAAgB,CAAC;AAIrD,eAAO,MAAM,SAAS,eAAsC,CAAC;AAE7D;;;GAGG;AACH,eAAO,MAAM,aAAa,WAAY,GAAG,KAAG,UAAU,GAAG,cAsBxD,CAAC;AAEF,eAAO,MAAM,+BAA+B,iEAIzC;IACD,wBAAwB,EAAE,wBAAwB,CAAC;IACnD,cAAc,EAAE,MAAM,CAAC;IACvB,aAAa,CAAC,EAAE,OAAO,CAAC;CACzB,WAGA,CAAC;AAEF,eAAO,MAAM,2BAA2B,YAAa;IACnD,gBAAgB,EAAE,oBAAoB,CAAC;CACxC,KAAG,kBAoCH,CAAC;AAEF;;;;;GAKG;AACH,eAAO,MAAM,oBAAoB,sBACZ,cAAc,EAAE,gBACrB,cAAc,EAAE,KAC7B,cAAc,EAchB,CAAC;AAEF,eAAO,MAAM,cAAc,2BAAyC;IAAE,QAAQ,EAAE,MAAM,CAAC;IAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;CAAE,qBAI1G,CAAC;AAEF,UAAU,WAAW;IACnB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,aAAa,CAAC,EAAE,MAAM,CAAC;IACvB,aAAa,CAAC,EAAE,MAAM,CAAC;IACvB,UAAU,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;CACtC;AA8CD;;;;;;;GAOG;AACH,wBAAsB,YAAY,CAAC,CAAC,EAClC,SAAS,EAAE,MAAM,OAAO,CAAC,CAAC,CAAC,EAC3B,EAAE,WAAe,EAAE,aAAmB,EAAE,aAA2B,EAAE,UAAe,EAAE,GAAE,WAAgB,GACvG,OAAO,CAAC,CAAC,CAAC,CA0CZ;AAED,eAAO,MAAM,gBAAgB,YAAa,MAAM,GAAG,UAAU,gBAO5D,CAAC;AAEF,eAAO,MAAM,WAAW,QAAS,MAAM,YAKtC,CAAC;AAyBF,eAAO,MAAM,aAAa,cAAe,MAAM,WAAW,MAAM,GAAG,UAAU,KAAG,MAAM,GAAG,UAAU,GAAG,WAgBrG,CAAC;AAEF,eAAO,MAAM,uBAAuB,wBAAyB,qBAAqB,EAAE,KAAG,MAAM,GAAG,SAM/F,CAAC;AAEF,eAAO,MAAM,gBAAgB,mFAK1B;IACD,kBAAkB,EAAE,MAAM,EAAE,CAAC;IAC7B,cAAc,EAAE,MAAM,CAAC;IACvB,wBAAwB,EAAE,wBAAwB,CAAC;IACnD,WAAW,CAAC,EAAE,OAAO,CAAC;CACvB;;;;;;;;;;;CAaA,CAAC;AAEF,eAAO,MAAM,oBAAoB,qCAI9B;IACD,QAAQ,EAAE,MAAM,CAAC;IACjB,OAAO,EAAE,MAAM,CAAC;IAChB,QAAQ,CAAC,EAAE,MAAM,CAAC;CACnB,SAQA,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,wBAAwB,6CAIlC;IACD,cAAc,EAAE,MAAM,CAAC;IACvB,UAAU,CAAC,EAAE,kBAAkB,CAAC;IAChC,OAAO,EAAE;QAAE,OAAO,EAAE,CAAC,GAAG,EAAE,MAAM,KAAK,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC,GAAG,MAAM,GAAG,IAAI,CAAA;KAAE,CAAC;CAC/E,KAAG,OAAO,CAAC,OAAO,CAOlB,CAAC;AAEF;;;;;;GAMG;AACH,eAAO,MAAM,wBAAwB,UAAW,OAAO,KAAG,OAKzD,CAAC;AAEF;;;;;;;;;;;;;;;;GAgBG;AACH,eAAO,MAAM,0BAA0B,gHAKpC;IACD,2BAA2B,EAAE,wBAAwB,CAAC;IACtD,2BAA2B,EAAE,wBAAwB,CAAC;IACtD,cAAc,CAAC,EAAE,cAAc,EAAE,CAAC;IAClC,4BAA4B,CAAC,EAAE,OAAO,CAAC;CACxC,KAAG,OAKH,CAAC"}
|
|
File without changes
|